特权管理基础架构下使用属性证书实现内网安全

Pi-Ju Tsai, Dwen-Ren Tsai, Wen-Pin Tai
{"title":"特权管理基础架构下使用属性证书实现内网安全","authors":"Pi-Ju Tsai, Dwen-Ren Tsai, Wen-Pin Tai","doi":"10.1109/CCST.2005.1594859","DOIUrl":null,"url":null,"abstract":"In the computerized organizations, the public key infrastructure (PKI) certifications enforce authentication services providing stronger security. The PKI provides a framework to verify the identity of each entity in a given domain. The PKI framework includes mechanisms of requesting, issuing, signing, and validating public-key certificates. The privilege management infrastructure (PMI) framework determines whether the entity is authorized to access specific resources. It includes the issuance and validation of attribute certificates. Public-key certificates are certificates for trusting public-key, while attribute certificates are certificates for trusting privilege attribute. In the practical cases, when the system identifies a user's identity, it allocates the right permissions to the resources to the user according to the roles he/she played. This permission control mechanism is called the role-based access control (RBAC). This paper addresses an efficient privilege management mechanism, based on PMI and RBAC, to achieve the information security objectives of non-repudiation, integrity, and security. A security model is built to solve problems of privilege management and duty delegation.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Intranet Security using Attribute Certificates under the Privilege Management Infrastructure\",\"authors\":\"Pi-Ju Tsai, Dwen-Ren Tsai, Wen-Pin Tai\",\"doi\":\"10.1109/CCST.2005.1594859\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the computerized organizations, the public key infrastructure (PKI) certifications enforce authentication services providing stronger security. The PKI provides a framework to verify the identity of each entity in a given domain. The PKI framework includes mechanisms of requesting, issuing, signing, and validating public-key certificates. The privilege management infrastructure (PMI) framework determines whether the entity is authorized to access specific resources. It includes the issuance and validation of attribute certificates. Public-key certificates are certificates for trusting public-key, while attribute certificates are certificates for trusting privilege attribute. In the practical cases, when the system identifies a user's identity, it allocates the right permissions to the resources to the user according to the roles he/she played. This permission control mechanism is called the role-based access control (RBAC). This paper addresses an efficient privilege management mechanism, based on PMI and RBAC, to achieve the information security objectives of non-repudiation, integrity, and security. A security model is built to solve problems of privilege management and duty delegation.\",\"PeriodicalId\":411051,\"journal\":{\"name\":\"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.2005.1594859\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2005.1594859","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在计算机化的组织中,公钥基础设施(PKI)证书执行身份验证服务,提供更强的安全性。PKI提供了一个框架来验证给定域中每个实体的身份。PKI框架包括请求、发布、签名和验证公钥证书的机制。特权管理基础设施(PMI)框架决定实体是否被授权访问特定资源。它包括属性证书的颁发和验证。公钥证书是信任公钥的证书,属性证书是信任特权属性的证书。在实际应用中,当系统识别出用户的身份时,系统会根据用户所扮演的角色为其分配相应的资源权限。这种权限控制机制称为基于角色的访问控制(RBAC)。本文讨论了一种基于PMI和RBAC的有效权限管理机制,以实现不可否认性、完整性和安全性的信息安全目标。为解决权限管理和职责委托问题,建立了安全模型。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Intranet Security using Attribute Certificates under the Privilege Management Infrastructure
In the computerized organizations, the public key infrastructure (PKI) certifications enforce authentication services providing stronger security. The PKI provides a framework to verify the identity of each entity in a given domain. The PKI framework includes mechanisms of requesting, issuing, signing, and validating public-key certificates. The privilege management infrastructure (PMI) framework determines whether the entity is authorized to access specific resources. It includes the issuance and validation of attribute certificates. Public-key certificates are certificates for trusting public-key, while attribute certificates are certificates for trusting privilege attribute. In the practical cases, when the system identifies a user's identity, it allocates the right permissions to the resources to the user according to the roles he/she played. This permission control mechanism is called the role-based access control (RBAC). This paper addresses an efficient privilege management mechanism, based on PMI and RBAC, to achieve the information security objectives of non-repudiation, integrity, and security. A security model is built to solve problems of privilege management and duty delegation.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信