Access control meets public key infrastructure, or: assigning roles to strangers

  • Amir Herzberg
  • , Yosi Mass
  • , Joris Mihaeli
  • , Dalit Naor
  • , Yiftach Ravid

Research output: Contribution to journalConference articlepeer-review

280 Scopus citations

Abstract

Existing role-based access control mechanisms are extended to provide a simple, modular architecture and easy migration from existing systems. The resulting system automatically collects missing certificates from peer servers. An implementation that can be used as an extension of a web server or as a separate server with interface to applications is discussed.

Original languageEnglish
Pages (from-to)2-14
Number of pages13
JournalProceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
StatePublished - 2000
Externally publishedYes
Event2000 IEEE Symposium on Security and Privacy - Berkeley, CA, USA
Duration: 14 May 200017 May 2000

Fingerprint

Dive into the research topics of 'Access control meets public key infrastructure, or: assigning roles to strangers'. Together they form a unique fingerprint.

Cite this