A new design of privilege management infrastructure with binding signature semantics

Kemal Bicakci*, Nazife Baykal

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

2 Citations (Scopus)

Abstract

Just like PKI, used to support public key certificates, Privilege Management Infrastructure (PMI) is built to provide a foundation to employ attribute certificates. Although most of the PKI ideas can be applied to PMI as well, PMI has some unique characteristics for instance it should handle attributes containing confidential information. Motivating by this fact, Dawson et al. recently proposed a new PMI design for those who would like to use the outsourced PKI but keep the PMI management inside the organization. In this paper, we propose an alternative design to have a more fine-grained control over attribute certificates. Immediate revocation and simplified verification are two big advantages of our approach.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
EditorsSokratis K. Katsikas, Stefanos Gritzalis, Javier Lopez
PublisherSpringer Verlag
Pages306-313
Number of pages8
ISBN (Print)3540222162, 9783540222163
DOIs
Publication statusPublished - 2004
Externally publishedYes

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3093
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Keywords

  • Attribute certificate
  • Binding signature semantics
  • Digital signature
  • PMI
  • Revocation

Fingerprint

Dive into the research topics of 'A new design of privilege management infrastructure with binding signature semantics'. Together they form a unique fingerprint.

Cite this