Park et al., 2001 - Google Patents
Role-based access control on the webPark et al., 2001
View PDF- Document ID
- 16259048495598541056
- Author
- Park J
- Sandhu R
- Ahn G
- Publication year
- Publication venue
- ACM Transactions on Information and System Security (TISSEC)
External Links
Snippet
Current approaches to access control on the Web servers do not scale to enterprise-wide systems because they are mostly based on individual user identities. Hence we were motivated by the need to manage and enforce the strong and efficient RBAC access control …
- 235000014510 cooky 0 abstract description 188
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Park et al. | Role-based access control on the web | |
US7293098B2 (en) | System and apparatus for storage and transfer of secure data on web | |
US8019881B2 (en) | Secure cookies | |
Park et al. | Binding identities and attributes using digitally signed certificates | |
CA2280869C (en) | System for providing secure remote command execution network | |
US7320073B2 (en) | Secure method for roaming keys and certificates | |
US8898457B2 (en) | Automatically generating a certificate operation request | |
Benantar | The Internet public key infrastructure | |
US20020035686A1 (en) | Systems and methods for secured electronic transactions | |
Park et al. | RBAC on the Web by Secure Cookies | |
Balfe et al. | Securing peer-to-peer networks using trusted computing | |
Selkirk | Using XML security mechanisms | |
Yeh et al. | Applying lightweight directory access protocol service on session certification authority | |
Muftic et al. | Security architecture for distributed systems | |
Park | Secure attribute services on the web | |
Karamanian et al. | PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks | |
Berger | A Scalable Architecture for Public Key Distribution Acting in Concert with Secure DNS | |
Neumann et al. | A framework and prototyping environment for a W3 security architecture | |
Perrin | Public key distribution through" cryptoIDs" | |
Zhou et al. | An efficient public-key framework | |
Dridi et al. | Managing Security in the World Wide Web: Architecture, Services and Techniques | |
Kornievskaia | Symmetric and Asymmetric Authentication: A Study of Symmetric and Complementary Properties and Their Effect on Interoperability and Scalability in Distributed Systems | |
Zidaric-Sudovacki | Secure WWW Server for Lotus Notes | |
Stefas | Decentralized authorization for web services | |
Goffee | Greenpass Client Tools for Delegated Authorization in Wireless Networks |