Role-based access control on the web
ACM Transactions on Information and System Security (TISSEC)
An authorization model for a public key management service
ACM Transactions on Information and System Security (TISSEC)
A secure workflow system for dynamic collaboration
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
IEEE Internet Computing
A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
An access control model for dynamic client-side content
Proceedings of the eighth ACM symposium on Access control models and technologies
Role-based access control on the web using LDAP
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Managing Multiple and Dependable Identities
IEEE Internet Computing
Peer-to-peer access control architecture using trusted computing technology
Proceedings of the tenth ACM symposium on Access control models and technologies
Dynamic security perimeters for inter-enterprise service integration
Future Generation Computer Systems
Toward a Usage-Based Security Framework for Collaborative Computing Systems
ACM Transactions on Information and System Security (TISSEC)
Autonomic and trusted computing paradigms
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
XML-Based revocation and delegation in a distributed environment
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
Component survivability at runtime for mission-critical distributed systems
The Journal of Supercomputing
Hi-index | 0.00 |
A certificate is digitally signed by a certificate authority (CA) to confirm that the information in the certificate is valid and belongs to the subject. Certificate users can verify the integrity and validity of a certificate by checking the issuing CA's digital signature in the certificate and, if necessary, chasing certificate chain and revocation lists. Usually, we use certificates to provide the integrity of identity or attribute information of the subject. Attributes must be coupled with the corresponding identities. We introduce comprehensive approaches to bind identity and attribute certificates, identifying three different techniques: monolithic, autonomic, and chained signatures. We describe each technique and analyze the relative advantages and disadvantages of each.