CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
An authorization model for a public key management service
ACM Transactions on Information and System Security (TISSEC)
An authorization infrastructure for nomadic computing
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
An Architecture for Survivable Coordination in Large Distributed Systems
IEEE Transactions on Knowledge and Data Engineering
MIERA: Method for Inter-Enterprise Role-Based Authorization
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
How Role Based Access Control is Implemented in SESAME
WET-ICE '97 Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
Mobile Agent Security - Issues and Directions
IS&N '99 Proceedings of the 6th International Conference on Intelligence and Services in Networks: Paving the Way for an Open Service Market
Preserving Privacy in Distributed Delegation with Fast Certificates
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Integrating PMI services in CORBA applications
Computer Standards & Interfaces - CORBA: protocols, applications, process models and standards
Fault-tolerant authentication services
International Journal of Computers and Applications
Applying authorization to intranets: architectures, issues and APIs
Computer Communications
Hi-index | 0.00 |
There are increasing requirements for the availability of practical solutions to the problem of providing secure single sign-on for users to applications anywhere on a network, but with affordable security management. Kerberos has been proven to be an effective solution to this problem for a local network, or within closely linked groups of users, but Kerberos is constrained by its current limitations of supporting purely symmetric key distribution, and an identity-based authorisation model. This paper describes how the SESAME (Secure European System for Applications in a Multi-vendor Environment) project has integrated asymmetric key distribution, and authorisation support to extend Kerberos to provide significant scalability and manageability improvements.