Skip to main content
Kent Academic Repository

Implementing Role Based Access Controls Using X.509 Attribute Certificates

Chadwick, David W., Otenko, Alexander, Ball, E. (2003) Implementing Role Based Access Controls Using X.509 Attribute Certificates. IEEE Internet Computing, . pp. 62-69. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14000)

The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided.
Official URL:
http://www.cs.kent.ac.uk/pubs/2003/2107

Abstract

This paper describes a policy driven role based access control system. The user's

roles, and the policy are stored in X509 Attribute Certificates. The policy, written in XML, describes who is trusted to allocate roles to users, and what permissions each role has. The DTD has been published at XML.org. Access control decisions are made by an Access Control Decision Function consisting of just three Java methods and a constructor. The decision is made according to the requested mode of access, the user’s trusted roles and the policy. A tool making and storing ACs is also described.

Item Type: Article
Uncontrolled keywords: Trust Management, X.509, Attribute Certificates, Role Based Access Controls, XML, Privilege Management Infrastructure
Subjects: Q Science > QA Mathematics (inc Computing science) > QA 76 Software, computer programming,
Divisions: Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Computing
Depositing User: Mark Wheadon
Date Deposited: 24 Nov 2008 18:01 UTC
Last Modified: 05 Nov 2024 09:47 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/14000 (The current URI for this page, for reference purposes)

University of Kent Author Information

  • Depositors only (login required):

Total unique views for this document in KAR since July 2020. For more details click on the image.