Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers.
Amir HerzbergYosi MassJoris MihaeliDalit NaorYiftach RavidPublished in: IEEE Symposium on Security and Privacy (2000)
Keyphrases
- access control
- public key infrastructure
- security mechanisms
- access control policies
- security policies
- role based access control model
- trust relationships
- role assignment
- access control models
- digital signature
- access control systems
- access rights
- rbac model
- security requirements
- role based access control
- public key
- key technologies
- security analysis
- access control mechanism
- security model
- identity management
- information systems
- database
- distributed systems
- data model