scispace - formally typeset
Proceedings ArticleDOI

Formal treatment of certificate revocation under communal access control

TLDR
This work focuses on the communal treatment of expiration and revocation of the digital certificates used for the authentication of the identity and roles of members of a distributed community of agents involved in some common activity.
Abstract
The conventional approach to distributed access control (AC) tends to be server-centric. Under this approach, each server establishes its own policy regarding the use of its resources and services by its clients. The choice of this policy, and its implementation, are generally considered the prerogative of each individual server. This approach to access control may be appropriate for many current client-server applications, where the server is an autonomous agent, in complete charge of its resources. It is not suitable for the growing class of applications where a group of servers, and sometimes their clients, belong to a single enterprise, and are subject to the enterprise-wide policy governing them all. One may not be able to entrust such an enterprise-wide policy to the individual servers, for two reasons: first, it is hard to ensure that an heterogeneous set of servers implement exactly the same policy. Second, as demonstrate, an AC policy can have aspects that cannot, in principle, be implemented by servers alone. As argued in a previous paper (Minsky, 2000), what is needed in this situation is a concept of communal policy that governs the interaction between the members of a distributed community of agents involved in some common activity along with a mechanism that provides for the explicit formulation of such policies, and for their scalable enforcement. We focus on the communal treatment of expiration and revocation of the digital certificates used for the authentication of the identity and roles of members of the community.

read more

Content maybe subject to copyright    Report

Citations
More filters

[서평]「Applied Cryptography」

염흥렬
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Posted Content

A Community Authorization Service for Group Collaboration

TL;DR: In this paper, the authors propose an approach to the representation, maintenance, and enforcement of fine-grained access control policies in distributed communities of resource providers and resource consumers, within which often complex and dynamic policies govern who can use which resources for which purpose.
Proceedings ArticleDOI

A community authorization service for group collaboration

TL;DR: This approach allows resource providers to delegate some of the authority for maintaining fine-grained access control policies to communities, while still maintaining ultimate control over their resources.
Journal ArticleDOI

PKI: it's not dead, just resting

TL;DR: Despite an original design that failed to address the marketplace's needs, the use of innovative public key infrastructure models can make the technology meet today's requirements.
Book ChapterDOI

Flexible Regulation of Distributed Coalitions

TL;DR: The main question addressed in this paper is how can these three policies be brought to bear, on a single transaction—given that the two internal policies P i and P j may be formulated independently of each other, and may be considered confidential by the respective enterprises.
References
More filters

[서평]「Applied Cryptography」

염흥렬
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Proceedings ArticleDOI

A Comparison of Commercial and Military Computer Security Policies

TL;DR: It is argued that a lattice model is not sufficient to characterize integrity policies, and that distinct mechanisms are needed to Control disclosure and to provide integrity.
Proceedings ArticleDOI

The NIST model for role-based access control: towards a unified standard

TL;DR: The NIST model focuses on those aspects of RBAC for which consensus is available and is organized into four levels of increasing functional capabilities called flat RBAC, hierarchicalRBAC, constrained RBAC and symmetric RBAC.
Book ChapterDOI

The role of trust management in distributed systems security

TL;DR: The concept of trust management is introduced, its basic principles are explained, and some existing trust-management engines are described, including PoHcyMaker and KeyNote, which allow for increased flexibility and expressibility, as well as standardization of modern, scalable security mechanisms.
Proceedings ArticleDOI

Access control meets public key infrastructure, or: assigning roles to strangers

TL;DR: The Trust Policy Language is presented, used to define the mapping of strangers to predefined business roles, based on certificates issued by third parties, and a simple, modular architecture and easy migration from existing systems is presented.
Related Papers (5)