Implementation of an Agent-Oriented Trust Management Infrastructure Based on a Hybrid PKI Model
نویسنده
چکیده
Access control in modern computing environments is different from access control in the traditional setting of operating systems. For distributed computing systems, specification and enforcement of permissions can be based on a public key infrastructure which deals with public keys for asymmetric cryptography. Previous approaches and their implementations for applying a public key infrastructure are classified as based either on trusted authorities with licencing or on owners with delegations. We present the architecture and main features of a trust management infrastructure based on a hybrid model which unifies and extends the previous public key infrastructure approaches. The trust management infrastructure constitutes a flexible framework for experimenting with the applications of different trust models.
منابع مشابه
An Architecture for Authorization and Delegation
Public key infrastructures and authentication protocols, in the sense they are currently known, have been publicly studied since 1978 [23]. In this work I demonstrate how I, together with the research group I have had the privilege to direct, have further developed these concepts in the Object-Oriented field. In our research, we have implemented a public key based system that allows distributed...
متن کاملDesigning and Validating the Service-Oriented University Model from the Standpoint of Higher Education Experts
Service orientation is a pivotal factor and a strategic direction for the university to keep with changes and perceptions of social needs. Accordingly, the main purpose of this study is to develop a model for the service-oriented university within the framework of service provision to the community. This research was conducted using a qualitative approach based on the grounded theory method. Th...
متن کاملPKI in Government Identity Management Systems
The purpose of this article is to provide an overview of the PKI project initiated part of the UAE national ID card program. It primarily shows the operational model of the PKI implementation that is indented to integrate the federal government identity management infrastructure with e-government initiatives owners in the country. It also explicates the agreed structure of the major components ...
متن کاملTrust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propagate trust in authentication over the Internet. This technology is based on a trust model defined by the original X.509 (1988) standard and is composed of three entities: the certification authority (CA), the certificate holder (or subject), and the Relying Party (RP). The CA plays the role of a tr...
متن کاملRisk and Trust Management Techniques RISK AND TRUST MANAGEMENT TECHNIQUES FOR AN “OPEN BUT BOUNDED” PUBLIC KEY INFRASTRUCTURE
Establishing trustworthiness requires an analysis of the business, technical and legal requirements for each party to a Public Key Infrastructure (PKI) based transaction. Much of the current discussion about PKI requirements revolves around the license, accreditation, or other sets of ratings as applied to certification authorities (CA). It is becoming apparent that an exclusive focus on CA qua...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003