A new design of privilege management infrastructure with binding signature semantics

2Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Just like PKI, used to support public key certificates, Privilege Management Infrastructure (PMI) is built to provide a foundation to employ attribute certificates. Although most of the PKI ideas can be applied to PMI as well, PMI has some unique characteristics for instance it should handle attributes containing confidential information. Motivating by this fact, Dawson et al. recently proposed a new PMI design for those who would like to use the outsourced PKI but keep the PMI management inside the organization. In this paper, we propose an alternative design to have a more fine-grained control over attribute certificates. Immediate revocation and simplified verification are two big advantages of our approach. © Springer-Verlag Berlin Heidelberg 2004.

Cite

CITATION STYLE

APA

Bicakci, K., & Baykal, N. (2004). A new design of privilege management infrastructure with binding signature semantics. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3093, 306–313. https://doi.org/10.1007/978-3-540-25980-0_25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free