Distributed Computing Applications and
Infrastructure (IS 206)
Fall 1998
[Group E Home] | [IS206
Home] [Milestone 5 Home]
Availability and Security
Overview of Availability and Security
GWD is a general application to ease collaborative Web development for all types
of organizations. These organizations can range from global-scale corporations
to small-scale special interest groups. Although usage of major GWD functions
is fairly consistent across different organizations, availability and security
are two characteristics requiring customization to the fit the needs and scope
of a particular organization.
How does availability and general environmental security differ from
the basic GWD features?
- Availability and general environmental security are properties which
differ from other features due to the fact that the administrative features
are features within the GWD and affect the collaborative functions of the
Global Web Developer as a Web development tool. The level of availability
and general security are partly functions of cost.
- Availability refers to the percentage of time an application is up
and running. High availability would be expected for GWD in optimal conditions.
Downtimes are not expected unless they are scheduled, as fo upgrades and general
maintenance, or are due to non-GWD related factors such as power failures.
However, as databases grow and traffic congestion increases, hardware and
equipment variables may hinder the availability of GWD. Availability can also
vary depending on the organization. For example, many smaller government-affiliated
organizations in Japan keep their websites online only during Japanese business
hours to limit their use of electricity and communication lines. For an organization
to minimize utility costs, the public server portion of GWD can be de-coupled
from the development portion to allow organizations to keep the public server
up and turn off select development servers during times when web development
is not taking place.
- Environmental Security refers to the reliable operation of the system
and protection of confidential information in the face of malicious behavior.
This is also an area dependent on the organization weighing the value of the
collaborative information and cost required for security. The GWD features
do not address these environmental security concerns because they are not
directly involved with web development. These cost-varying security measures
may include, but are not limited to, creating backups for the complete databases,
hiring reliable network security operators, or using an extensive authentication
system based on digital certificates.
Another environmental security concern outside of the scope of GWD depends
on the security of the different web browsers and email applications used
in conjunction with GWD. Security of these application and GWD is determined
by their respective levels of security protection. Therefore, the security
of the browsers and email applications will be dependent on their respective
application distributors as well as the internal administration maintaining
these applications.
top
Important Security Capabilities
Security is a key issue in collaborative authorship. The security capabilities of GWD can be classified into three major areas: physical security, trustworthiness, and fault tolerance.
- Physical Security
- Access Control refers to the conditional access of users depending
on their group affiliation and their status as a website developer. This requires
a secure GWD user database with the user authentication password and the information
pertaining to the permissions of the user. In GWD, access control differentiates
users of a particular website in terms of a having quality authority for publicizing
documents, having the ability to edit and create webpages within the given
website group, and having the right to read and annotate without the ability
to edit. The intranet portion of GWD will be maintained by firewalls.
- GWD Administration refers to the protocol for a particular user
or two who is responsible for maintaining the different websites, work groups,
and users. These people have an enormous responsibility because they have
the power to change accessibility information and have direct access to sensitive
password information.
- Quality Authorization refers to the protocol where a particular
user has the authority to do a final check before a webpage, developed under
GWD is placed on a public domain. This is a security measure to verify that
a webpage meets the website's stylistic criteras as well as fulfill the organization's
expectation.
- Trustworthiness
- Authentication refers to the verification of user identity and will
be based on the use of passwords. For security purposes, two separate databases
have been created for different types of users. One type of user is the general
Web-browsing public and the second is the developing users who will utilize
the GWD application.
Tighter security measures are taken for the GWD users database as this
database includes information pertaining to access privileges. In the case
of the GWD user authentication, a double barrier will be implemented where
a group identity will be required as a password along with the personal
password.
- Confidentiality in the context of the GWD relies heavily to the
group-based restrictions given to the collaborative authoring groups to maintain
confidentiality. Users not among a specific group should not have access to
read or write on the given unless agreed upon by the other group members.
Encryption is used to maintain the confidential nature across the Internet.
- Data Integrity refers to the accurate representation of data insuring
that the data has not been modified since its last intentional modification.
Although high integrity is important for editting and creating the Web documents,
from the point of collaborative authoring, integrity in annotation is one
of the more important.
- Non-repudication refers to the inability to deny an act that had
taken place. In GWD non-repudiation is maintained by automatically dating
and noting the user annotation flags as well as keeping a user log with information
pertaining to labor tracking.
- Fault Tolerance
- Data Replication refers to keeping replicated copies of data in
the case that data is lost. The most obvious form of data replication is the
backup feature. A form of data replication is used in the version control
feature and the feature on replication-reconciliation which creates a copy
of a document for editing.
- Data Persistence refers to data outliving the program creating it.
This concept can be loosely applied to the version control feature. The version
control feature creates an archive of a particular website and depending on
circumstances an older version is brought back and implemented.
top
Future Security Features
Digital certificates and secret keys are features
that are not be implemented in GWD at this time.
These security features are essential if the information exchange involves
sensitive, personal, or financial information. Because GWD is focused on collaborative
Web development, GWD inherently includes many features allowing user interaction
and provides an environment for checks and balance.
In general, for Web development collaborations, the above authentication and
message integrity protocols will be sufficient. However, if an organization
feels the need for these extra security, GWD will be able to accomodate applications
offering certificate authentication systems as well as applications for secret
key-related encryption/decryption geared toward group users. GWD will remain
open to incorporating digital certificates in the authentication procedure as
their usage become more widely spread and accepted.
top
[Milestone 5 Home]
last updated 11/24/98