Abstract
At present, many countries allow citizens or entities to interact with the government outside the telematic environment through a legal representative who is granted powers of representation. However, if the interaction takes place through the Internet, only primitive mechanisms of representation are available, and these are mainly based on non-dynamic offline processes that do not enable quick and easy identity delegation. This paper proposes a system of dynamic delegation of identity between two generic entities that can solve the problem of delegated access to the telematic services provided by public authorities. The solution herein is based on the generation of a delegation token created from a proxy certificate that allows the delegating entity to delegate identity to another on the basis of a subset of its attributes as delegator, while also establishing in the delegation token itself restrictions on the services accessible to the delegated entity and the validity period of delegation. Further, the paper presents the mechanisms needed to either revoke a delegation token or to check whether a delegation token has been revoked. Implications for theory and practice and suggestions for future research are discussed.
This is a preview of subscription content, access via your institution.
References
Decision 2004/387/EC of the European Parliament and of the Council of 21 April 2004 on the interoperable delivery of pan-European eGovernment services to public administrations, businesses and citizens (IDABC). Off. J. Eur. Union Luxembourg, L 181, 25–35 (18 May 2004)
Communication from the Commission to the Council, the European Parliament, the Ecomnomic and Social Commitee and The Comittee of Regions—eEurope 2005: An information society for all [COM(2002) 263 final]. Brussels (28 May 2002)
Communities, Commission of the European. Communication from the Commission to the Council, the European Parliament, the European Economic and Social Committee and the Committee of the Regions. i2010 eGovernment Action Plan: Accelerating eGovernment in Europe for the Benefit of All. (25 Apr 2006). http://ec.europa.eu/idabc/servlets/Doc?id=25286
General, European Commission Information Society and Media Directorate. Signpost towards eGovernment 2010. (Nov 2005)
AAVV: A Roadmap for a pan-European eIDM Framework by 2010. Version 1.0. http://ec.europa.eu/information_society/activities/egovernment/docs/pdf/eidm_roadmap_paper.pdf. Accessed Aug 2010
Graux, H., Dumortier, J.: Report on the State of Pan-European eID Initiatives. Technical Department, ENISA (2009)
Team, The Modinis IDM Study: Modinis Study on Identity Management in eGovernment: Common Terminological Framework for Interoperable Electronic Identity Management. Version 2.01. (23 Nov de 2005). http://www.cosic.esat.kuleuven.be/modinis-idm/twiki/bin/view.cgi/Main/GlossaryDoc. Accessed Aug 2010
Brmme, A., Busch, C., Hhnlein, D.: Cross-Context Delegation through Identity Federation. In: Peeters, R., et al. (eds.) Proceedings of the Special Interest Group on Biometrics and Electronic Signatures. Vols. Lecture Notes in Informatics (LNI) P-137. Bonner Kllen Verlag, pp. 79–92 (2008)
Alrodhan, W., Mitchell, C. J.: A delegation Framework for Liberty. In: Proceedings of the 3rd Conference on Advances in Computer Security and Forensics (ACSF’08). Liverpool John Moores University, Liverpool, pp. 67–73 (2008)
Sandhu R. et al.: Role-based access control models. IEEE Comput. 29, 38–47 (2006)
Zhang, L., Ahn, G., Chu, B.: A rule-based framework for role-based delegation. In: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies. pp. 153–162 (2001)
Welch, V., et al.: X.509 Proxy Certificates for Dynamic Delegation. 3rd Annual PKI R&D Workshop (2004)
Gomi, H., et al.: A delegation framework for federated identity management. In: Proceedings of the 2005 Workshop on Digital identity management. Fairfax, VA, USA (2005)
Farrell, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization. IETF RFC 3281 (2002)
Liberty Alliance Project. http://www.projectliberty.org. Accessed Aug 2010
Komura, T., et al.: Proposal of delegation using electronic certificates on single sign-on system with SAML-protocol. SAINT’09. Ninth Annual International Symposium on Applications and the Internet (2009)
Tuecke, S., et al.: Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile. IETF RFC 3820 (2004)
Ragouzis, N., et al.: Security Assertion Markup Language (SAML) V2.0 Technical Overview. http://docs.oasis-open.org/security/saml/Post2.0/sstc-saml-tech-overview-2.0.pdf. v16. (2008), Accessed June 2010
Housley, R., et al.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. IETF RFC 3280 (2002)
Cooper, D., et al.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. IETF RFC 5280 (2008)
Myers, M., et al.: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol—OCSP. IETF RFC 2560 (1999)
OASIS: SAML. Online Community for the Security Assertion Markup Language (SAML) OASIS Standard. http://saml.xml.org/saml-specifications. Accessed June 2010
Maler, E., Mishra, P., Philpott, R.: Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V1.1. http://www.oasis-open.org/committees/download.php/3406/oasis-sstc-saml-core-1.1.pdf. Accessed June 2010
OASIS: OASIS Security Services Technical Committee. http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=security. Accessed June 2010
OASIS: Organization for the Advancement of Structured Information Standards. http://www.oasis-open.org/home/index.php. Accessed June 2010
GridShib: http://gridshib.globus.org/. Accessed June 2010
VVAA: An X.509 Binding for SAML. http://spaces.internet2.edu/display/GS/X509BindingSAML
Berners-Lee, T., Fielding, R., Masinter, L.: Uniform Resource Identifier (URI): Generic Syntax. IETF RFC 3986 (2005)
Web Services Addressing 1.0—Core: W3C Recommendation. http://www.w3.org/TR/2006/REC-ws-addr-core-20060509. Accessed May 2010
Duerst, M., Suignard, M.: Internationalized Resource Identifiers (IRIs). IETF RFC 3987 (2005)
Federal Information Processing Standards Publication (FIPS PUB) 180-2. Secure Hash Standard (2002)
Myers, M., et al.: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol—OCSP. IETF RFC 2560 (1999)
Oracle Corporation: Java. http://java.sun.com/. Accessed June 2010
Java SE Downloads: http://java.sun.com/javase/downloads/widget/jdk6.jsp. Accessed June 2010
Oracle Corporation: Netbeans IDE. http://netbeans.org/. Accessed June 2010
The Apache Software Foundation: Apache Tomcat. http://tomcat.apache.org/. Accessed June 2010
The Legion of the Bouncycastle. Bouncy Castle Crypto APIs for Java. http://www.bouncycastle.org/java.html. Accessed June 2010
University of Chicago. Globus Toolkit. http://www.globus.org/toolkit/. Accessed June 2010
Board of Trustees of the University of Illinois. GridShib. http://gridshib.globus.org/. Accessed June 2010
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sánchez García, S., Gómez Oliva, A., Pérez Belleboni, E. et al. Solving identity delegation problem in the e-government environment. Int. J. Inf. Secur. 10, 351–372 (2011). https://doi.org/10.1007/s10207-011-0140-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-011-0140-7
Keywords
- Digital identity
- Identity delegation
- Proxy certificate
- X.509
- SAML