By Topic

Exploiting X.509 Certificate and Multi-agent System Architecture for Role-Based Access Control and Authentication Management

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Somchart Fugkeaw ; Thai Digital ID Co.,Ltd., Bangkok, Thailand ; Piyawit Manpanpanich ; Sekpon Juntapremjitt

This paper proposes the design of multi-user authentication in the multi-application based environment and role-based access control by using PKI Authentication and X.509 privilege management infrastructure (PMI). A binding model of RBAC authorization based on attribute certificate (AC) and public key certificate (PKC) is presented. Especially, the way of attribute mapping between PKC, bridge AC, and role AC is illustrated. In addition, the activity-based policy enforcement is introduced to make the system respond to malicious activities more appropriately. At a core, the multi agent system approach is applied to automate the flexible and effective management of user authentication, role delegation as well as system accountability. Finally, we reported our ongoing implementation status and demonstrated that our proposed model is a potential solution to support strong authentication and dynamic authorization in the multi-user and multi-application environment.

Published in:

Computer and Information Technology, 2007. CIT 2007. 7th IEEE International Conference on

Date of Conference:

16-19 Oct. 2007