Implementing Role Based Access Controls Using X.509 Attribute Certificates

Chadwick, David W. and Otenko, Alexander and Ball, E. (2003) Implementing Role Based Access Controls Using X.509 Attribute Certificates. IEEE Internet Computing . pp. 62-69. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

The full text of this publication is not available from this repository. (Contact us about this Publication)
Official URL


This paper describes a policy driven role based access control system. The user's roles, and the policy are stored in X509 Attribute Certificates. The policy, written in XML, describes who is trusted to allocate roles to users, and what permissions each role has. The DTD has been published at Access control decisions are made by an Access Control Decision Function consisting of just three Java methods and a constructor. The decision is made according to the requested mode of access, the user’s trusted roles and the policy. A tool making and storing ACs is also described.

Item Type: Article
Uncontrolled keywords: Trust Management, X.509, Attribute Certificates, Role Based Access Controls, XML, Privilege Management Infrastructure
Subjects: Q Science > QA Mathematics (inc Computing science) > QA 76 Software, computer programming,
Divisions: Faculties > Science Technology and Medical Studies > School of Computing > Security Group
Depositing User: Mark Wheadon
Date Deposited: 24 Nov 2008 18:01
Last Modified: 16 Jul 2014 08:59
Resource URI: (The current URI for this page, for reference purposes)
  • Depositors only (login required):


Downloads per month over past year