By Topic

A New Design Scheme of Role-Based Access Control Based on PKI

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Yuping Deng ; Harbin Institute of Technology, P.R. China ; Xiaowei Guo ; Xiamu Niu

Identification and authorization are the two important problems among the intractable issues of network security. In this thesis, we first discuss the advantages and disadvantages of several traditional ways in identification and authorization including Kerberos, SSL, DAC, MAC, RBAC and PKI/PMI. Because of the inherent weakness of DAC and MAC, and the complexity of PMI, we propose a new system which combines role-based access control with PKI. It implements the process of identifying and privilege delegation as a whole. The model of RBAC based on PKI can ensure the security of both identification and authorization of the protected system and maximize the flexibility for users' maintenance. The particular process of identification and authorization has been given in the thesis. At last, we analyze the security of the system and also point out some existing threats the new framework has to face to

Published in:

First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06)  (Volume:3 )

Date of Conference:

Aug. 30 2006-Sept. 1 2006