DOI: 10.1007/978-3-540-73408-6_19
|View full text |Cite
|
Sign up to set email alerts
|

Using WebDAV for Improved Certificate Revocation and Publication

Abstract: Abstract. There are several problems associated with the current ways that certificates are published and revoked. This paper discusses these problems, and then proposes a solution based on the use of WebDAV, an enhancement to the HTTP protocol. The proposed solution provides instant certificate revocation, minimizes the processing costs of the certificate issuer and relying party, and eases the administrative burden of publishing certificates and certificate revocation lists (CRLs).

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 13 publications
(12 reference statements)
0
6
0
Order By: Relevance
“…If the CVS has to pull credentials from the issuers or their repositories, then all the credentials have to be held consistently -either all with their subjects or all with their issuers, otherwise the CVS will not be able to efficiently locate them. In our implementation all credentials are held with their subjects, typically in their LDAP directory entries, or more recently, in files linked to their DNs held in WebDAV repositories [24]. As Li et al point out [17], building an authorisation credential chain is more difficult in general than building an X.509 public key certificate chain, because in the latter one merely has to follow the subject/issuer chain in a tree, whereas in the former, a DAG rather than a tree may be encountered.…”
Section: Delegation Tree Navigationmentioning
confidence: 99%
See 1 more Smart Citation
“…If the CVS has to pull credentials from the issuers or their repositories, then all the credentials have to be held consistently -either all with their subjects or all with their issuers, otherwise the CVS will not be able to efficiently locate them. In our implementation all credentials are held with their subjects, typically in their LDAP directory entries, or more recently, in files linked to their DNs held in WebDAV repositories [24]. As Li et al point out [17], building an authorisation credential chain is more difficult in general than building an X.509 public key certificate chain, because in the latter one merely has to follow the subject/issuer chain in a tree, whereas in the former, a DAG rather than a tree may be encountered.…”
Section: Delegation Tree Navigationmentioning
confidence: 99%
“…If any credential between the requestor's credential and the root of trust has been revoked, then the requestor's credential is considered to be invalid, and processing stops. We have also implemented a novel scheme for revoking credentials which uses the web as a finite state machine to indicate the revocation status of each credential [24]. This scheme inherently supports instant revocation and can be more efficient than using CRLs.…”
Section: Delegation Tree Navigationmentioning
confidence: 99%
“…These windows provide forms for users to fill in, then the tool generates the corresponding PERMIS policy in extensible markup language (XML). Policies can be saved as pure XML in text files, or the XML can be embedded as a policy attribute in an X.509 AC 7, digitally signed with the policy author's private key (held in a PKCS#12 file (public key cryptography standards)), then stored in either a local file, Lightweight Directory Access Protocol (LDAP) directory or WebDAV 13 repository. Various helpers in the Policy Editor are capable of retrieving subject and AA names from LDAP directories, and setting times and dates in the correct format.…”
Section: Permis: a Modular Authorization Infrastructurementioning
confidence: 99%
“…The revocation resources can be located in diverse repositories. Examples of typical repositories that are used in a PKI are X.500 directories [8], LDAP directories [9], DNS servers [10], WebDAV [11], Web or FTP servers [12], or HTTP stores according to [13] specified additionally in [14] as an RFC. To notify about the location of a CRL the CRLDistributionPoint [2] extension is added to the sequence of extensions of the Notification.…”
Section: Notification About Revocation Repositoriesmentioning
confidence: 99%