Relying party credentials framework

Amir Herzberg, Yosi Mass

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

We present architecture for e-business applications that receive requests from a party over the Net, to allow the applications to make decisions relying on the credentials of the requesting party. Relying party applications will be provided with uniform interface to the credentials of the requesting party. This will allow use of simple, widely available credentials as well as more advanced credentials such as public key certificates, attribute certificates and ‘Negative‘credentials such as certificate revocation lists (CRL). The core of the architecture is a Credential Manager who will provide all credential management functions, including collection of credentials, providing uniform interface to credentials, and extracting semantics relevant to the relying party’s applications.

Original languageEnglish
Title of host publicationTopics in Cryptology - CT-RSA 2001 - The Cryptographers’ Track at RSA Conference 2001, Proceedings
EditorsDavid Naccache
PublisherSpringer Verlag
Pages328-343
Number of pages16
ISBN (Electronic)3540418989, 9783540418986
DOIs
StatePublished - 2001
Externally publishedYes
EventCryptographers' Track at RSA Conference, CT-RSA 2001 - San Francisco, United States
Duration: 8 Apr 200112 Apr 2001

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2020
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceCryptographers' Track at RSA Conference, CT-RSA 2001
Country/TerritoryUnited States
CitySan Francisco
Period8/04/0112/04/01

Bibliographical note

Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 2001.

Fingerprint

Dive into the research topics of 'Relying party credentials framework'. Together they form a unique fingerprint.

Cite this