Skip to main content

An Internet Authorization Scheme Using Smart-Card-Based Security Kernels

  • Conference paper
  • First Online:
  • 789 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2140))

Abstract

This paper presents an authorization scheme for applications distributed on the Internet with two levels of access control: a global level, implemented through a fault- and intrusion-tolerant authorization server, and a local level implemented as a security kernel located on both the local host Java Virtual Machine (JVM) and on a Java Card connected to this host.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [Abghour et al. 2001]_N. Abghour, Y. Deswarte, V. Nicomette and D. Powell, Specification of Authorisation Services, MAFTIA Project IST-1999-11583 Contract Report, LAAS-CNRS, N∘01.001, Jan. 2001, http://www.maftia.org/deliverables/D27V13.pdf>.

  2. [Ao et al. 2001]_X. Ao, N. H. Minsky and V. Ungureanu, “Formal Treatment of Certificate Revocation Under Communal Access Control”, in IEEE Symposium on Security and Privacy, (Oakland, CA), pp. 116–127, IEEE Computer Society Press, 2001.

    Google Scholar 

  3. [Au et al. 2000]_R. Au, M. Looi and P. Ashley, “Cross-Domain One-Shot Authorization using Smart Cards”, in 7th ACM Conference on Computer and Communications Security (CCS-2000), (S. Jajodia and P. Samarati, Eds.), (Athens, Greece), pp. 220–226, ACM Press, 2000.

    Google Scholar 

  4. L. Blain and Y. Deswarte, “Intrusion-Tolerant Security Server for Delta-4”, in ESPRIT 90 Conference, (CEC-DG-XIII, Ed.), (Brussels (Belgium)), pp. 355–370, Kluwer Academic Publishers, 1990.

    Google Scholar 

  5. C. Ellison, SPKI Requirements, IETF, RFC 2692, September 1999, pp.

    Google Scholar 

  6. D. Hagimont and J.-J. Vandewalle, “JCCap: Capability-Based Access Control for Java Card”, in 4th IFIP WG8.8 Working Conference on Smart Card Research and Advanced Applications (CARDIS-2000), (J. Domingo-Ferrer, D. Chan and A. Watson, Eds.), (Bristol, UK), pp. 365–388, Kluwer Academic Publishers, 2000.

    Google Scholar 

  7. HP, HP Praesidium Authorization Server 3.1: Increasing Security Requirements in the Extended Enterprise, November 2, 1998, accessible at the following URL: <http://www.hp.com/security/products/authorization_server/papers/whitepaper/>.

  8. B. C. Neuman and T. Tso, “Kerberos: an Authentication Service for Computer Networks”, IEEE Communications, 32(9), 1994.

    Google Scholar 

  9. V. Nicomette, La protection dans les systèmes à objets répartis, Thèse de Doctorat de l’Institut National Polytechnique de Toulouse, LAAS Report 96496, 1996, (in French).

    Google Scholar 

  10. V. Nicomette and Y. Deswarte, “Symbolic Rights and Vouchers for Access Control in Distributed Object Systems”, in Proc. 2nd Asian Computing Science Conference (ASIAN’96), (Singapour), LNCS n∘1179, pp. 193–203, Springer-Verlag, 1996.

    Google Scholar 

  11. V. Nicomette and Y. Deswarte, “An Authorization Scheme for Distributed Object Systems”, in Proc. Int. Symposium on Security and Privacy, (Oakland, CA, USA), pp. 21–30, IEEE Computer Society Press, 1997.

    Google Scholar 

  12. T. Parker, “A Secure European System for Applications in a Multivendor Environment (The SESAME project)”, in 14th National Computer Security Conference, (Washington (DC, USA)), pp. 505–513, NCSC and NIST, 1991.

    Google Scholar 

  13. [Zurko et al. 1999]_M.-E. Zurko, R. Simon and T. Sanfilipo, “A User-Centered, Modular Authorization Service Built on an RBAC Foundation”, in IEEE Symposium on Security and Privacy, (Berkeley (CA, USA)), pp. 57–71, 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Deswarte, Y., Abghour, N., Nicomette, V., Powell, D. (2001). An Internet Authorization Scheme Using Smart-Card-Based Security Kernels. In: Attali, I., Jensen, T. (eds) Smart Card Programming and Security. E-smart 2001. Lecture Notes in Computer Science, vol 2140. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45418-7_7

Download citation

  • DOI: https://doi.org/10.1007/3-540-45418-7_7

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42610-3

  • Online ISBN: 978-3-540-45418-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics