{"title":"Security architecture based on secret key and privilege attribute certificates","authors":"Y. Sameshima","doi":"10.1109/ICDP.1996.864214","DOIUrl":null,"url":null,"abstract":"An authentication server which employs the secret-key cryptography holds the secret keys of user clients and application servers in a local database, and this leads to attacks on the database, key propagation from a master server to slave servers and the management from a remote console. The situation of a privilege attribute server is same. In order to solve the problems the author introduces secret key certificate and privilege attribute certificate, which can be handled same as the public key certificate. The certificates can be used not only for authentication and privilege attribute services but also delegation of privilege and messaging system.","PeriodicalId":127207,"journal":{"name":"Proceedings of IFIP/IEEE International Conference on Distributed Platforms","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of IFIP/IEEE International Conference on Distributed Platforms","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDP.1996.864214","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
An authentication server which employs the secret-key cryptography holds the secret keys of user clients and application servers in a local database, and this leads to attacks on the database, key propagation from a master server to slave servers and the management from a remote console. The situation of a privilege attribute server is same. In order to solve the problems the author introduces secret key certificate and privilege attribute certificate, which can be handled same as the public key certificate. The certificates can be used not only for authentication and privilege attribute services but also delegation of privilege and messaging system.