Browse > Article

Implement of XML-Based Authorization Policy Module  

Shin Myeong-Sook (조선대학교 전자정보공과대학 컴퓨터공학과)
Lee Joon (조선대학교 전자정보공과대학 컴퓨터공학과)
Abstract
PKI provides good resolutions for the authentication of user in the situation not to meet each other, but it is not enough to provide the resolution of authorization in distributed computing environments. Especially, we offer a variety forms of the user Authentication, the Integrity and a security service of the Non-Repudiation, but an authorization Policy, because of the complexity with a lot of information, using m understandable XML, makes a simple and easy certificate to read, and we get the information from DOM fee and do a XML analysis and stardardized-method usage easily In this paper, we provide the AAS model being able to use with the solution of the distributed users' authorization, and we implement an authorization policy module, using XML. in the Linux-based Apache Web server.
Keywords
PKI; XML; SSL; Authentication; Authorization;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Fong, H.K. Wong and Z. Cheng, 'Converting relational database into XML documents with DOM', Information and Software Technology, Vol.45, pp. 335-355, 2003   DOI   ScienceOn
2 Chris Lesniewski-Lass, M. Frans Kaashoek, 'SSL splitting: Securely serving data from untrusted caches', Computer Networks, Vol.48, pp. 763-779, 2005   DOI   ScienceOn
3 Ryutov, Neuman, 'Access control framework for distributed application', IETF, 2000
4 Kenneth G. Paterson, Geraint Price, 'A comparison between traditional public key infrastructures and identity-based cryptography', Information Security Technical Report, Vol.8, No.3, pp. 57-72, 2003   DOI   ScienceOn
5 Timothy G. Shoriak, 'SSL TLS Protocol Enablement for key Recovery', Computer & Security, pp. 100-104, 2000
6 T.M. E A.G.A.J. Loeffen, 'Succession in standardization: grafting XML onto SGML', Computer Standards & Interfaces, Vol.24, pp. 279-290, 2002   DOI   ScienceOn