[go: up one dir, main page]

Park et al., 2001 - Google Patents

Role-based access control on the web

Park et al., 2001

View PDF
Document ID
16259048495598541056
Author
Park J
Sandhu R
Ahn G
Publication year
Publication venue
ACM Transactions on Information and System Security (TISSEC)

External Links

Snippet

Current approaches to access control on the Web servers do not scale to enterprise-wide systems because they are mostly based on individual user identities. Hence we were motivated by the need to manage and enforce the strong and efficient RBAC access control …
Continue reading at www.cerias.purdue.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • H04L9/0836Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure

Similar Documents

Publication Publication Date Title
Park et al. Role-based access control on the web
US7293098B2 (en) System and apparatus for storage and transfer of secure data on web
US8019881B2 (en) Secure cookies
Park et al. Binding identities and attributes using digitally signed certificates
CA2280869C (en) System for providing secure remote command execution network
US7320073B2 (en) Secure method for roaming keys and certificates
US8898457B2 (en) Automatically generating a certificate operation request
Benantar The Internet public key infrastructure
US20020035686A1 (en) Systems and methods for secured electronic transactions
Park et al. RBAC on the Web by Secure Cookies
Balfe et al. Securing peer-to-peer networks using trusted computing
Selkirk Using XML security mechanisms
Yeh et al. Applying lightweight directory access protocol service on session certification authority
Muftic et al. Security architecture for distributed systems
Park Secure attribute services on the web
Karamanian et al. PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks
Berger A Scalable Architecture for Public Key Distribution Acting in Concert with Secure DNS
Neumann et al. A framework and prototyping environment for a W3 security architecture
Perrin Public key distribution through" cryptoIDs"
Zhou et al. An efficient public-key framework
Dridi et al. Managing Security in the World Wide Web: Architecture, Services and Techniques
Kornievskaia Symmetric and Asymmetric Authentication: A Study of Symmetric and Complementary Properties and Their Effect on Interoperability and Scalability in Distributed Systems
Zidaric-Sudovacki Secure WWW Server for Lotus Notes
Stefas Decentralized authorization for web services
Goffee Greenpass Client Tools for Delegated Authorization in Wireless Networks