Advertisement

The ET-RBAC Based Privilege Management Infrastructure for Wireless Networks

  • Dong-Gue Park
  • You-Ri Lee
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2738)

Abstract

M-commerce have grown rapidly, it is very important to determine whether an identity is permitted to access a resource in mobile environments. In this paper we propose ET-RBAC based Wireless Privilege Management Infrastructure(WPMI) model and Wireless Attribute Certificate(WAC) for authorization in mobile communication. All access control decisions are driven by an authorization policy, which is itself stored in an WAC. Authorization policies are written in XML according to a DTD that has been published at XML.org. Finally we show the effectiveness of the proposed ET-RBAC by applying it to an example of M-commerce service.

Keywords

Mobile User Shopping Mall Wireless Environment Authorization Policy Task Instance 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Arsenault, A., Turner, S.: Internet X.509 Public Key Infrastructure PKIX Roadmap Work in Progress. Internet-draft (March 05 2000), http://www.ietf.org/internet-drafts/draft-ietf-pkix-roadmap-05.txt
  2. 2.
    Adams, C., Lloyd, S.: Understanding Public-Key Infrastructure: Concepts, Standards and Deployment Considerationsíí. Macmillan Technical Publishing, Basingstoke (1999)Google Scholar
  3. 3.
    Rec, I.T.U.-T.: X.509 2000 |ISO/IEC 9594-8 The Directory: Authentication FrameworkGoogle Scholar
  4. 4.
    Housley, R., Ford, W., Polk, T., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and CRL Profile. RFC 2459, IETF PKIX Working Group (January 1999), http://www.ietf.org/rfc/rfc2459.txt
  5. 5.
    Aresenault, A., Tuner, S.: Internet X.509 Public Key Infrastructure, Internet Draft (November 2000)Google Scholar
  6. 6.
    Lee, J.I., Park, J.H., Song, J.S.: Domestic PKI model for WAP. Institute of Information Security & Cryptology Journal (October 2000)Google Scholar
  7. 7.
    Wireless Application Protocol Wireless Transport Layer Security, WAP Forum (April 6 2001)Google Scholar
  8. 8.
    Jin, S.H., Choi, D.S., Cho, Y.S., Yoon, E.J.: Attribute Authentication technology & PMI. Institute of Information Security & Cryptology Journal (December 2000)Google Scholar
  9. 9.
    Farrell, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization, Internet Draft (June 2001)Google Scholar
  10. 10.
    Farrell, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization, RFC 3281 (April 2002), available on line at http://www.ietf.org/rfc/rfc3281.txt
  11. 11.
    ISO/IEC 9594-8/ITU-T Recommendation X.509, Information Technology-Open System Interconnection: The Directory: Authentication Framework (2002)Google Scholar
  12. 12.
    Park, D.G., Hwang, Y.D.: RBAC in Distributed Retrieving Systems by Attribute Certificates. In: IC 2001 (2001)Google Scholar
  13. 13.
    Knight, S., Grandy, C.: Scalability Issues in PMI Delegation. In: 1st Annual PKI Research Workshop-proceedings (April 2002)Google Scholar
  14. 14.
    Park, J.S., Sandhu, R.: Binding Identities and Attributes Using Digitally Signed Certificates. In: ACSAC 2000 (2000)Google Scholar
  15. 15.
    Chadwick, D.W., Otenko, O.: The PERMIS X.509 Role based Privilege Management Infrastructure. In: SACMAT 2002 (2002)Google Scholar
  16. 16.
    Chadwick, D.W., Otenko, A.: RBAC Polices in XML for X.509 based Privilege Management. In: Sec 2000 (2000)Google Scholar
  17. 17.
    Chadwick, D.W.: Privilege Management Infrastructure. Business Briefing: Global Security Systems Reference SectionGoogle Scholar
  18. 18.
    Park, D.G., Lee, Y.R.: The PMI model for the wireless environment. In: KOCIES Conference 2002 (2002)Google Scholar
  19. 19.
    Nykanen, T.: Attribute Certificate in X.509. In: HUT TML 2000, Tik-110.501 Seminar on Network Security (2000)Google Scholar
  20. 20.
    Park, D.G., Hwang, Y.D.: A Extended Task-Role-Based access control model for access control enforcement in Enterprise Environments. In: EALPIIT 2002 (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Dong-Gue Park
    • 1
  • You-Ri Lee
    • 1
  1. 1.Department of Information and Technology EngineeringCollege of Engineering, SoonChunHyang UniversityKorea

Personalised recommendations