Role-Based Access Control for XML Enabled Management Gateways

  • V. Cridlig
  • O. Festor
  • R. State
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3278)


While security is often supported in standard management frameworks, it has been insufficiently approached in most deployment and research initiatives. In this paper we address the provisioning of a security “continuum” for management frameworks based on XML/SNMP gateways. We provide an in depth security extension of such a gateway using the Role Based Access Control paradigm and show how to integrate our approach within a broader XML-based management framework.


management gateways SNMP XML-based management security key management 


  1. 1.
    Oh, Y.J., Ju, H.T., Choi, M.J., Hong, J.W.K.: Interaction Translation Methods for XML/SNMP Gateway. In: Feridun, M., Kropf, P.G., Babin, G. (eds.) DSOM 2002. LNCS, vol. 2506, pp. 54–65. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  2. 2.
    Strauss, F., Klie, T.: Towards XML Oriented Internet Management. In: Goldszmidt, G.S., Schönwälder, J. (eds.) Proceedings of the Eighth IFIP/IEEE International Symposium on Integrated Network Management (IM 2003). IFIP Conference Proceedings, vol. 246, pp. 505–518. Kluwer, Dordrecht (2003)CrossRefGoogle Scholar
  3. 3.
    Bray, T., Paoli, J., Sperberg-McQueen, C.M., Maler, E., Yergeau, F.: Extensible Markup Language (XML) 1.0 (Third edn.). W3C Recommendation (2004)Google Scholar
  4. 4.
    W3C: World Wide Web Consortium (W3C),
  5. 5.
    Keller, A., Kar, G.: Determining Service Dependencies in Distributed Systems. In: Proceedings of the IEEE International Conference on Communications (ICC 2001), IEEE, Los Alamitos (2001)Google Scholar
  6. 6.
    Yoon, J.H., Ju, H.T., Hong, J.W.: Development of SNMP-XML Translator and Gateway for XML-based Integrated Network Management. International Journal of Network Management 13, 259–276 (2003)CrossRefGoogle Scholar
  7. 7.
    Martin-Flatin, J.P.: Web-Based Management of IP Networks and Systems. Wiley, Chichester (2003)Google Scholar
  8. 8.
    Case, J., Mundy, R., Partain, D., Stewart, B.: Introduction and Applicability Statements for Internet Standard Management Framework. STD 62 (2002),
  9. 9.
    Stallings, W.: Network Security Essentials, 2nd edn. Prentice-Hall, Englewood Cliffs (2002)Google Scholar
  10. 10.
    Subramanian, M.: Network Management, Principle and Practice. Addison-Wesley, Reading (1999)Google Scholar
  11. 11.
    Blumenthal, U., Wijnen, B.: User-based Security Model for version 3 of the Simple Network Management Protocol (SNMPv3). STD 62 (2002),
  12. 12.
    Blumenthal, U., Wijnen, B.: View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP). STD 62 (2002),
  13. 13.
    Kuhn, R.: Role Based Access Control. NIST Standard Draft (2003)Google Scholar
  14. 14.
    Lee, H., Noh, B.: Design and Analysis of Role-Based Security Model in SNMPv3 for Policy-Based Security Management. In: Chong, I. (ed.) ICOIN 2002. LNCS, vol. 2344, pp. 430–441. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  15. 15.
    Anderson, A.: XACML Profile for Role Based Access Control (RBAC). OASIS Committee Draft (2004)Google Scholar
  16. 16.
    Microsoft: Ws-authorization,
  17. 17.
    Neumann, G., Strembeck, M.: An Approach to Engineer and Enforce Context Constraints in an RBAC Environment. In: Proceedings of the eighth ACM symposium on Access control models and technologies, pp. 65–79. ACM Press, New York (2003)CrossRefGoogle Scholar
  18. 18.
    Freier, A., Karlton, P., Kocher, P.: The SSL Protocol Version 3.0. Technical report, Netscape (1996)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2004

Authors and Affiliations

  • V. Cridlig
    • 1
  • O. Festor
    • 1
  • R. State
    • 1
  1. 1.LORIA – INRIA LorraineVillers-les-NancyFrance

Personalised recommendations