ETSI TR 118 516 provides technical solutions for oneM2M authorization architecture, authorization proceduresand access control policies. The present document also gives evaluations of these proposed technical solutions.
ETSI TS 118 103 [i.2] only defines a high level authorization architecture that describes its major components andgeneral authorization procedure. The objective of the present document is to provide candidate security solutions relatedto authorization architecture, authorization procedures and access control policies.
The present document provides security solutions in the following three aspects:
- Detailed design of authorization architecture: This part investigates the interfaces among authorizationcomponents (e.g. procedures and parameters), how these components could be distributed in differentoneM2M entities (i.e. different CSEs), and how to implement Role Based Access Control (RBAC) and tokenbased access control.
- Supporting user specified access control policies: This part investigates how the oneM2M authorizationsystem could be an extensible system that can support user-defined access control mechanisms and/or accesscontrol policy languages.
- Investigating existing access control policy languages: This part investigates if some standardized accesscontrol policy languages could become oneM2M recommended access control policy description languages.
- Edition:
- 2.0.0
- Published:
- 09/01/2016
- Number of Pages:
- 55
- File Size:
- 1 file , 520 KB
- Note:
- This product is unavailable in Russia, Ukraine, Belarus
Reviews
There are no reviews yet.