By Topic

Using attribute certificate to design role-based access control

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Wang Chang-Ji ; Network Res. Center, Tsinghua Univ., Beijing, China ; Wu Jian-ping ; Duan Hai-Xin

Public key infrastructure (PKI), privilege management infrastructure (PMI) and role based access control (RBAC) are well-established approaches to ease the management of secure systems and to enable secure distributed systems. We elaborate on using the RBAC approach for its administrative advantages combined with authentication based on public key certificates (PKCs) and authorization based on attributes certificates (ACs). In particular, we concentrate on how they can be integrated to support the authentication and authorization model in CERNET setting.

Published in:

Parallel and Distributed Computing, Applications and Technologies, 2003. PDCAT'2003. Proceedings of the Fourth International Conference on

Date of Conference:

27-29 Aug. 2003