{"title":"Simplified authority model of partition rule based access control","authors":"Chen Song, She Kun, Zhou Ming-Tian","doi":"10.1109/PDCAT.2003.1236298","DOIUrl":null,"url":null,"abstract":"With the problem of the effective certificate revocation for partition rule based access control remaining, we provide a user authority model based on the nonpublic key certificate approach and implement security access control of the information domain. Based on the clearance structure of X.509 v4, this model accomplishes three main functions: authority trust facility, authority certificate and certificate storage. It implements security information exchange on heterogeneous platforms, and achieves secure access to target resources with another identity authentication method.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PDCAT.2003.1236298","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
With the problem of the effective certificate revocation for partition rule based access control remaining, we provide a user authority model based on the nonpublic key certificate approach and implement security access control of the information domain. Based on the clearance structure of X.509 v4, this model accomplishes three main functions: authority trust facility, authority certificate and certificate storage. It implements security information exchange on heterogeneous platforms, and achieves secure access to target resources with another identity authentication method.