Certificate-based access control for widely distributed resources

  • Authors:
  • Mary Thompson;William Johnston;Srilekha Mudumbai;Gary Hoo;Keith Jackson;Abdelilah Essiari

  • Affiliations:
  • Information and Computing Sciences Division, Ernest Orlando Lawrence Berkeley National Laboratory, Berkeley, CA;Information and Computing Sciences Division, Ernest Orlando Lawrence Berkeley National Laboratory, Berkeley, CA;Information and Computing Sciences Division, Ernest Orlando Lawrence Berkeley National Laboratory, Berkeley, CA;Information and Computing Sciences Division, Ernest Orlando Lawrence Berkeley National Laboratory, Berkeley, CA;Information and Computing Sciences Division, Ernest Orlando Lawrence Berkeley National Laboratory, Berkeley, CA;Information and Computing Sciences Division, Ernest Orlando Lawrence Berkeley National Laboratory, Berkeley, CA

  • Venue:
  • SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
  • Year:
  • 1999

Quantified Score

Hi-index 0.00

Visualization

Abstract

We have implemented and deployed an access control mechanism that uses digitally-signed certificates to define and enforce an access policy for a set of distributed resources that have multiple, independent and geographically dispersed stakeholders. The stakeholders assert their access requirements in use-condition certificates and designate those trusted to attest to the corresponding user attributes. Users are identified by X.509 identity certificates. During a request to use a resource, a policy engine collects all the relevant certificates and decides if the user satisfies all the requirements. This paper describes the model, architecture and implementation of this system. It also includes some preliminary performance measurements and our plans for future development of the system.