Intranet Security using Attribute Certificates under the Privilege Management Infrastructure

Pi-Ju Tsai, Dwen-Ren Tsai, Wen-Pin Tai
{"title":"Intranet Security using Attribute Certificates under the Privilege Management Infrastructure","authors":"Pi-Ju Tsai, Dwen-Ren Tsai, Wen-Pin Tai","doi":"10.1109/CCST.2005.1594859","DOIUrl":null,"url":null,"abstract":"In the computerized organizations, the public key infrastructure (PKI) certifications enforce authentication services providing stronger security. The PKI provides a framework to verify the identity of each entity in a given domain. The PKI framework includes mechanisms of requesting, issuing, signing, and validating public-key certificates. The privilege management infrastructure (PMI) framework determines whether the entity is authorized to access specific resources. It includes the issuance and validation of attribute certificates. Public-key certificates are certificates for trusting public-key, while attribute certificates are certificates for trusting privilege attribute. In the practical cases, when the system identifies a user's identity, it allocates the right permissions to the resources to the user according to the roles he/she played. This permission control mechanism is called the role-based access control (RBAC). This paper addresses an efficient privilege management mechanism, based on PMI and RBAC, to achieve the information security objectives of non-repudiation, integrity, and security. A security model is built to solve problems of privilege management and duty delegation.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2005.1594859","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In the computerized organizations, the public key infrastructure (PKI) certifications enforce authentication services providing stronger security. The PKI provides a framework to verify the identity of each entity in a given domain. The PKI framework includes mechanisms of requesting, issuing, signing, and validating public-key certificates. The privilege management infrastructure (PMI) framework determines whether the entity is authorized to access specific resources. It includes the issuance and validation of attribute certificates. Public-key certificates are certificates for trusting public-key, while attribute certificates are certificates for trusting privilege attribute. In the practical cases, when the system identifies a user's identity, it allocates the right permissions to the resources to the user according to the roles he/she played. This permission control mechanism is called the role-based access control (RBAC). This paper addresses an efficient privilege management mechanism, based on PMI and RBAC, to achieve the information security objectives of non-repudiation, integrity, and security. A security model is built to solve problems of privilege management and duty delegation.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
特权管理基础架构下使用属性证书实现内网安全
在计算机化的组织中,公钥基础设施(PKI)证书执行身份验证服务,提供更强的安全性。PKI提供了一个框架来验证给定域中每个实体的身份。PKI框架包括请求、发布、签名和验证公钥证书的机制。特权管理基础设施(PMI)框架决定实体是否被授权访问特定资源。它包括属性证书的颁发和验证。公钥证书是信任公钥的证书,属性证书是信任特权属性的证书。在实际应用中,当系统识别出用户的身份时,系统会根据用户所扮演的角色为其分配相应的资源权限。这种权限控制机制称为基于角色的访问控制(RBAC)。本文讨论了一种基于PMI和RBAC的有效权限管理机制,以实现不可否认性、完整性和安全性的信息安全目标。为解决权限管理和职责委托问题,建立了安全模型。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
On the effects of image quality degradation on minutiae- and ridge-based automatic fingerprint recognition Face recognition with small and large size databases Biometric verification of humans by means of hand geometry Security, Internet connectivity and aircraft data networks The X-ray object recognition test (X-ray ORT) - a reliable and valid instrument for measuring visual abilities needed in X-ray screening
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1