Abstract

We have implemented and deployed an access control mechanism that uses digitally-signed certificates to define and enforce an access policy for a set of distributed resources that have multiple, independent and geographically dispersed stakeholders. The stakeholders assert their access requirements in use-condition certificates and designate those trusted to attest to the corresponding user attributes. Users are identified by X.509 identity certificates. During a request to use a resource, a policy engine collects all the relevant certificates and decides if the user satisfies all the requirements. This paper describes the model, architecture and implementation of this system. It also includes some preliminary performance measurements and our plans for future development of the system. 1. Motivation: Distributed Computing Environments In distributed computing environments such as research collaborations spanning several institutions, there may be independent and geographically dispe...

Keywords

Access controlComputer scienceCertificateRole-based access controlCertificate authorityPublic key certificatePublic key infrastructureAuthorization certificateArchitectureSet (abstract data type)Identity (music)Computer securityDatabasePublic-key cryptography

Affiliated Institutions

Related Publications

Publication Info

Year
1999
Type
article
Pages
17-17
Citations
223
Access
Closed

External Links

Citation Metrics

223
OpenAlex

Cite This

Mary R. Thompson, William Johnston, Srilekha Mudumbai et al. (1999). Certificate-based access control for widely distributed resources. , 17-17.