Cross-Domain Access Control via PKI

  • Authors:
  • G. Denker;J. Millen;Y. Miyake

  • Affiliations:
  • -;-;-

  • Venue:
  • POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this note we consider how role-based access control can be managed on a large scale over the Internet and across organizational boundaries. We take a PKI approach, in which users are identified using public key certificates, as are the servers. The main features of ourapproach are: access control by (client, role) pair; implied revocation based on the role hierarchy; automatic generation of certificate validity tickets; and certificate chains to prove a client role hierarchy to a server.