Chapter 2 motivated trust issues and safeguards for authorizations in the digital world. In this Chapter an appropriate architectural model for secure authorizations is presented. The notion of security supported by the model is further examined in Chap. 4.
In the following, an architectural model for secure authorizations is introduced.The model generalizes from the hybrid PKI model of Biskup and Karabulut [18, 19, 125] by abstracting from PKI-specific technology. The exposition focuses on the parties that are communicating directly with the service user. Licensing, delegation and the various modes of interaction, as defined by Biskup and Karabulut, are not described, they work just as in the hybrid PKI model [18, 19, 125]. The model for secure authorizations is already prepared for the extensions we make for pseudonymization in Chap. 8.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). An Architectural Model for Secure Authorizations. In: Privacy-Respecting Intrusion Detection. Advances in Information Security, vol 35. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-68254-9_3
Download citation
DOI: https://doi.org/10.1007/978-0-387-68254-9_3
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-34346-4
Online ISBN: 978-0-387-68254-9
eBook Packages: Computer ScienceComputer Science (R0)