be federated through the CMS service.
• Connectivity. With respect to nomadic scenarios,
temporal disconnection from central
communication services offering access to certain
profile information may occur. This requires to
support nomadic user mobility which has specific
consequences for the enforcement of security
mechanisms, i.e., access to locally available
profile information should still be possible.
• Low complexity. This mainly addresses the service
interface which should insulate from the com-
plexity of data distribution, heterogeneity of
communication and data management
mechanisms.
4 CMS PROFILE FORMAT
In our approach, a profile is considered to be a data
container which can be split into two main parts:
• Data payload: this is the data uniquely
characterizing the configurable entity (e.g., name,
first name etc. of a user). Properties, as the most
basic profile data elements, are vectors of property
name and value with an associated type pairs. It
has to be ensured that the name of a property is
unique within a profile. The value part of a
property can be anything ranging from simple data
types to complex data structures.
• Meta-data: this is information describing the
format of the data, for instance whether it can be
linked to other data (e.g., profiles) or information
concerning its origin, location, history etc. The
meta-data is used for the processing of the profile
information within the customization management
system.
A configurable entity can be a user, hardware
(i.e., a device or device configuration) or a software
component (e.g., application or service), an
organisation (e.g., a company), a network, or the
environment in which such user is acting (context
data). Thus, we consider different profile domains
like user, device, service, application, network and
context profiles.
Each type of domain profile has to support a
certain set of generic operations: lifecycle operations
(create, delete, replicate), editing operations
(composing, linking, modifying, and moving),
retrieval (lookup) and advanced operations
(versioning, synching, inheritance, evolution).
Additionally, there are domain-specific operations.
The profiles may reside on different types of
storages reflecting the different levels of security.
For example, device characteristics might be stored
on a networked resource, whereas identity
information as part of the user profile has to be
retrieved from tamper-resistant smart cards.
A key feature of the CMS is the ability to
logically link sets of profile instances to each other
in order to reflect coherent relations between them.
The respective information model supporting this
has to be mapped to the according bearers (database
schema, standard or proprietary file system on a
storage device etc.) in the PAIs (Profile Access
Interfaces). For the bearer-independent handling of
profile information inside the CMS and in the
applications accessing the CMS we have foreseen a
set of XML schema definitions specifying the
domain profiles. This format is also used as a bearer
independent representation of results returned as a
response to access queries requesting profile sets or
profile fragments. Moreover, the network profile
access interface (NPAI) employs this format for
persistently storing profile information.
5 CMS ARCHITECTURE
The CMS constitutes a light-weight service
infrastructure supporting advanced personalization
through the use of distributed profiled information.
The approach is based on a simple layered protocol
featuring a request / response mechanism. For
integrating different CMS instances, the service
dispatches profile access requests either to local
resources or to distant resources; this is achieved
through a portable URI-based addressing scheme
which is handled through the core CMS component
(see Fig. 1), the Profile Access Manager (PAM).
Quite naturally, the PAM is required to feature
widely accepted communication mechanisms and
formats; it can be either integrated as a library or by
utilizing the provided CMS port together with a
secured transport protocol. For the latter, an
accessing entity has to know the CMS address made
up of the host name and the CMS port, i.e. one host
can run multiple CMS instances. The SSL/TLS-
based server could be addressed by
https://www.ubisec.org/cms?message=[b64c]
where [b64c] constitutes a base64 encoded CMS
request.
The developed request format features a query
part that is used to specify access commands. These
are coded by means of a access and manipulation
language. For routing requests to the according PAI,
a resource part (containing schema definition,
addressed authority, and path information) is
foreseen. Both, resource and query part together
form an access query:
EFFICIENT POLICY-BASED ACCESS CONTROL IN WEB-BASED PERSONALIZATION MANAGEMENT - For
Use in Convergent Applications
371