Skip to main content

A Lightweight Security Model for WBEM

  • Conference paper
  • 463 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2889))

Abstract

Web-Based Enterprise Management (WBEM) is an emerging standard solution for remote management of heterogeneous devices. It allows to remotely operate and administer a group of hardware and software devices while preserving some security features. The aim of this paper is two-fold: 1) We raise concerns regarding security weaknesses of the architecture of WBEM. 2) We propose a lightweight security model for WBEM based on the concept of Attribute Authority and show its effectiveness in preserving both the security and the performance of the system. Moreover, we address the concept of accountability and present guidelines for an implementation of our model.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proc. of the 17th Symposium on Security and Privacy, Oakland, CA, May 1996, pp. 164–173. IEEE Computer Society Press, Los Alamitos (1996)

    Google Scholar 

  2. Desktop Management Task Force: User and Security Model White Paper (June 2003), http://www.dmtf.org/standards/documents/CIM/DSP0139.pdf

  3. Desktop Management Task Force: Web-based Enterprise Management, http://www.dmtf.org

  4. Desktop Management Task Force: CIM Schema version 2.5, http://www.dmtf.org

  5. Khurana, H., Gligor, V.D., Linn, J.: Reasoning about Joint Administration of Access Policies for Coalition Resources. In: Proc. of the 22nd International Conference on Distributed Computing Systems (ICDCS 2002), Vienna, Austria, July 2-5, pp. 429–440. IEEE Computer Society Press, Los Alamitos (2002)

    Chapter  Google Scholar 

  6. Dierks, T., Allen, C.: The TLS Protocol, version 1.0. Network Working Group, IETF RFC 2246 (1999)

    Google Scholar 

  7. OpenSSL group: The OpenSSL Package, http://www.openssl.org

  8. Housley, R., Ford, W., Polk, W., Solo, D.: Internet X509 Public Key Infrastructure: Certificate and CRL Profile. IETF RFC 3280 (April 2002)

    Google Scholar 

  9. Aura, T.: Distributed Access-Rights Management with Delegation Certificates. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol. 1603, pp. 211–236. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  10. Engert, D., Thompson, M., Tuecke, S.: Internet X.509 Public Key Infrastructure: Restricted Delegation Certificate Profile. Internet Draft (July 2001)

    Google Scholar 

  11. Engert, D., Thompson, M., Tuecke, S.: Internet X.509 Public Key Infrastructure: Impersonation Certificate Profile. Internet Draft (July 2001)

    Google Scholar 

  12. Ellison, C.: SPKI Requirements. IETF RFC 2693

    Google Scholar 

  13. Rivest, R., Lampson, B.: A Simple Distributed Security Infrastructure (April 1996)

    Google Scholar 

  14. Sun Microsystems, Inc.: Solaris WBEM Services Administrator’s Guide, http://docs.sun.com/db/doc/806-6468

  15. Open Group: Open Pegasus, http://www.openpegasus.org

  16. Sun Microsystems, Inc.: Solaris WBEM Services, http://wwws.sun.com/software/solaris/wbem

  17. Microsoft Corporation: Learning about Windows Management Instrumentation (WMI) (July 1999), http://msdn.microsoft.com

  18. Wahl, M., Howes, T., Kille, S.: Lightweight Directory Access Protocol (v3). IETF RFC 2251 (December 1997)

    Google Scholar 

  19. Farrell, S.: TLS extensions for AttributeCertificate based authorization. Internet draft (August 1998)

    Google Scholar 

  20. Thompson, M., Johnston, W., Mudumbai, S., Hoo, G., Jackson, K.: Certificate- Based Access Control for Widely Distributed Resources. In: Proc. of the 8th USENIX Security Symposium (SECURITY 1999), August 23-26, pp. 215–228. Usenix Association (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cattaneo, G., Catuogno, L., Petrillo, U.F., Visconti, I. (2003). A Lightweight Security Model for WBEM. In: Meersman, R., Tari, Z. (eds) On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops. OTM 2003. Lecture Notes in Computer Science, vol 2889. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39962-9_94

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39962-9_94

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20494-7

  • Online ISBN: 978-3-540-39962-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics