Secure and flexible certificate access in WS-security through LDAP component matching.
Sang Seok LimJong Hyuk ChoiKurt D. ZeilengaPublished in: SWS (2004)
Keyphrases
- access control
- role based access control
- rbac model
- public key encryption
- authentication mechanism
- factor authentication
- authentication and access control
- public key infrastructure
- security requirements
- access control mechanism
- lightweight
- data security
- data encryption
- security mechanisms
- security issues
- security architecture
- password authentication
- unauthorized access
- security model
- key management
- security level
- identity management
- directory service
- authentication protocol
- security measures
- security analysis
- key exchange protocol
- security protocols
- security management
- security policies
- cryptographic protocols
- security properties
- security patterns
- identity based encryption
- public key
- diffie hellman
- trusted computing
- information providers
- encryption scheme
- security services
- service oriented
- authentication scheme
- user authentication
- standard model
- stream cipher
- sensitive data
- proxy re encryption
- secure communication
- intrusion detection
- multi domain
- access control policies
- rfid tags
- information security
- wireless sensor networks
- electronic voting
- digital rights management
- rfid systems
- data sharing
- network security