Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2003.10C.6.739

Design of Privilege Delegation Mechanism using Proxy Certificate  

Jin, Seung-Hun (한국전자통신연구원 인증기반연구팀)
Cho, Sang-Rae (한국전자통신연구원 정보보호연구본부 인증기반연구팀)
Kim, Tae-Sung (한국전자통신연구원 정보보호연구본부 인증기반연구팀)
Ryou, Jae-Cheol (충남대학교 정보통신공학부)
Abstract
In real life, we frequently use th proxy signatrue by delegating one's own privileges. It is necessary to distribute the data related to privilege delegation securely in order to use such a proxy signature in the Internet. However, inorder to use the secure proxy signature, we need to have some mechanism to prevent a proxy signer from misuse of privileges by applying proxy certificate and a privilege delegation mechanism to manage information with related to privilege delegarion. In addition, we have implemented the prototype to demonstrate the possible proxy signature service using proxy certificate.
Keywords
PKI; Public Key Infrastructure; Proxy Certificate; Certificate; Delegation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Housley, R., W. Ford, W. Polk and D. Solo, 'Internet X.509 Public Key Infrastructure Certificate and CRL Profile,' Internet Draft draft-ietf-pkik-new-partl-Iz.txt (update to RFC 2459), January, 2002
2 S. Tuecke, D. Engert, I. Foster, Internet X.509 Public Key Infrastructure Proxy Certificate Profile Internet Draft draft-ietf-pkix-proxy-02.txt, August, 2002
3 Bradner, S., 'Key words for use in RFCs to Indicate Requirement Levels,' BCP 14, RFC 2119, March, 1997
4 Butler, R., D. Engert, I. Foster, C. Kesselman and S. Tuecke, 'A National-Scale Authentication Infrastructure,' IEEE Computer, Vol.33, pp.60-66, 2000   DOI   ScienceOn
5 Farrell, S. and R. Housley, 'An Internet Attribute Certificate Profile for Authorization,' Internet Draft draft-ietf'pkix-ac509prof-06.txt, January, 2001