Smart Certi cates : Extending X . 509 for Secure Attribute Services on the WebJoon
نویسندگان
چکیده
An attribute is a particular property of an entity, such as a role, access identity, group, or clearance. If attributes are provided integrity, authentication, and conndentiality, Web servers can then trust these secure attributes and use them for many purposes, such as access control, authorization, authentication, and electronic transactions. In this paper, we present a comprehensive approach to secure attribute services on the Web. We identify the user-pull and server-pull models and analyze their advantages and disadvantages. To support these models on the Web, we extend X.509 certiicates, which are already in widespread current use. We name these extended X.509 certii-cates smart certiicates. Smart certiicates have several sophisticated features: they support short-lived lifetime and multiple CAs, contain attributes, provide postdated and renewable certiicates, and provide conndentiality. This paper also discusses possible applications of smart certiicates on the Web.
منابع مشابه
Smart Certi cates: Extending X.509 for Secure Attribute Services on the Web
An attribute is a particular property of an entity, such as a role, access identity, group, or clearance. If attributes are provided integrity, authentication, and con dentiality, Web servers can then trust these secure attributes and use them for many purposes, such as access control, authorization, authentication, and electronic transactions. In this paper, we present a comprehensive approach...
متن کاملRBAC on the Web by Smart Certi cates Joon
We have described in another paper how to develop and use smart certiicates by extending X.509 with several sophisticated features for secure attribute services on the Web. In this paper, we describe an implementation of RBAC (Role-Based Access Control) with role hierarchies on the Web as one possible application of smart certiicates. To support RBAC, we issued smart certiicates-which hold the ...
متن کاملLife-cycle management of X.509 certificates based on LDAP directories
Companies and organizations employ PKI technology to secure the communication in their intranets and over the internet. The services of authentication, non-repudiation, con dentiality and the transport of authorization information are often supported by X.509 certi cates. The synchronization of the certi cates' life-cycle with the management of the PKI users is a common problem. We propose a me...
متن کاملAMBAR Protocol: Access Management Based on Authorization Reduction
In the last years, SPKI, X.509 attribute certi cates, or KeyNote has been proposed as mechanisms to create and specify authorization certi cates, access control lists, or security policies in distributed environments. In this work we propose a new protocol able to negotiate and use some of these speci cations. AMBAR is a multi-layered protocol based on a request/response model. In general, it p...
متن کاملProviding X.509-based User Access Control to Web Servers
This paper describes an access control model based on X.509v3 certi cates for user authorization on HTTP servers secured by SSL. The authorization model presented is based on the concept of authentication roles , that are the handlers that identify a single certi cate (or a group of them) inside the access control list (ACL). The separation between authentication (role mapping) and authorizatio...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999