Role-based privilege management using attribute certificates and delegation

2Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The Internet provides tremendous connectivity and immense information sharing capability which the organizations can use for their competitive advantage. However, we still observe security challenges in Internet-based applications that demand a unified mechanism for both managing the authentication of users across enterprises and implementing business rules for determining user access to enterprise applications and their resources. These business rules are utilized for privilege management or authorization in a security context. In this paper, we design a role-based privilege management leveraging access control models and X.509 attribute certificate. We attempt to develop an easy-to-use, flexible, and interoperable authorization mechanism. Also, we demonstrate the feasibility of our architecture by providing the proof-of-concept prototype implementation using commercial off-the-shelf technologies. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Ahn, G. J., Shin, D., & Zhang, L. (2004). Role-based privilege management using attribute certificates and delegation. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3184, 100–109. https://doi.org/10.1007/978-3-540-30079-3_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free