2004
DOI: 10.1023/b:elec.0000009280.90875.05
|View full text |Cite
|
Sign up to set email alerts
|

Relying Party Credentials Framework

Abstract: Abstract. We present architecture for framework to allow a relying-party to decide if and how to handle requests coming over the Net, by relying on the credentials of the requesting party. Relying party applications will be provided with uniform interface to the credentials of the requesting party. This will allow use of simple, widely available credentials as well as more advanced credentials such as public key certificates, attribute certificates and `Negative` credentials (which result in reduced trust) suc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2008
2008
2013
2013

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 20 publications
(18 reference statements)
0
2
0
Order By: Relevance
“…As the theory must precede the implementation, many of the results reported in this paper are not yet included in the TrustBuilder prototypes. The current implementations utilize the IBM Trust Establishment (TE) system [Herzberg et al 2000;Herzberg and Mass 2001] to create X.509v3 certificates. Attributes associated with credential owners are stored in user-defined extensions of X.509v3 certificates.…”
Section: Summary and Future Workmentioning
confidence: 99%
“…As the theory must precede the implementation, many of the results reported in this paper are not yet included in the TrustBuilder prototypes. The current implementations utilize the IBM Trust Establishment (TE) system [Herzberg et al 2000;Herzberg and Mass 2001] to create X.509v3 certificates. Attributes associated with credential owners are stored in user-defined extensions of X.509v3 certificates.…”
Section: Summary and Future Workmentioning
confidence: 99%
“…Other related work is the work on credential specification for stranger parties. In particular, the work by IBM on Trust Policy Language (TPL) [Herzberg and Mass 2001] is devoted to the enforcement of an XML-based framework for specifying and managing role-based access control in a distributed context. This framework has been extended for mapping subject certificates to a role, based on policies defined by the owner of the resource and on the roles of the issuers of the certificates [Herzberg et al 2000].…”
Section: Related Workmentioning
confidence: 99%