Distributed A ess-Rights Management with Delegation Certi ates
نویسنده
چکیده
منابع مشابه
Delegation in Distributed Systems: Challenges and Open Issues
New certi cate-oriented access control systems are based on delegation of privileges. In these scenarios, resource guards have an ACL which delegates to some authorization or naming authorities the right to manage the access to the controlled resources. These authorities can issue certi cates delegating these permissions to other subordinates authorities, or to speci c users. In this way, the g...
متن کاملA Secure Infrastructure for Service Discovery Access in Pervasive Computing
Security is paramount to the success of pervasive computing environments. The system presented in this paper provides a communications and security infrastructure that goes far in advancing the goal of anywhere anytime computing. Our work securely enables clients to access and utilize services in heterogeneous networks. We provide a service registration and discovery mechanism implemented throu...
متن کاملEfficient Verification of Delegation in Distributed Group Membership Management
In ad-hoc networks and other highly distributed and decentralized environments, authorization certificates can be used to control access. Moreover, it is possible to delegate rights listed in the certificate to another users. Several such subsequent delegations build a chain of certificates. Chains of delegation certificates can improve the capability and manageability of systems. Distributed g...
متن کاملSelf-certiied Keys { Concepts and Applications
The authenticity of public keys in an asymmetric cryptosystem can be gained in two di erent ways: either it is veri ed explicitly after knowing the public key and its certi cate, e.g. X.509 certi cates, or it is veri ed implicitly during the use of the keys. The latter concept has been introduced by Girault 1991 as self-certi ed keys. In this paper we extend this concept: We show how to issue s...
متن کاملWorkflow-based Authorization Service in Grid
In a distributed environment, specific rights may be required while a task is controlled and processed. A user should delegate enough rights to a task for processing. Tasks cannot work correctly if delegated rights are insufficient, or security threats may occur if delegated rights are excessive. Restricted delegation is the step that delegates proper rights to a task, and that enables finegrai...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007