Implementing Role Based Access Controls Using X.509 Attribute Certificates

Chadwick, David W. and Otenko, A. and Ball, E. (2003) Implementing Role Based Access Controls Using X.509 Attribute Certificates. IEEE Internet Computing . pp. 62-69. (The full text of this publication is not available from this repository)

The full text of this publication is not available from this repository. (Contact us about this Publication)
Official URL
http://www.cs.kent.ac.uk/pubs/2003/2107

Abstract

This paper describes a policy driven role based access control system. The user's roles, and the policy are stored in X509 Attribute Certificates. The policy, written in XML, describes who is trusted to allocate roles to users, and what permissions each role has. The DTD has been published at XML.org. Access control decisions are made by an Access Control Decision Function consisting of just three Java methods and a constructor. The decision is made according to the requested mode of access, the user’s trusted roles and the policy. A tool making and storing ACs is also described.

Item Type: Article
Uncontrolled keywords: Trust Management, X.509, Attribute Certificates, Role Based Access Controls, XML, Privilege Management Infrastructure
Subjects: Q Science > QA Mathematics (inc Computing science) > QA 76 Software, computer programming,
Divisions: Faculties > Science Technology and Medical Studies > School of Computing > Security Group
Depositing User: Mark Wheadon
Date Deposited: 24 Nov 2008 18:01
Last Modified: 11 May 2012 14:36
Resource URI: http://kar.kent.ac.uk/id/eprint/14000 (The current URI for this page, for reference purposes)
  • Depositors only (login required):