spki/sdsi2.0 is the most popular trust management system at present. But in spki/SD-SI2.0, as long as a principal provides a valid certificate chain to the server, it may be authorized letting the resource owner's...
详细信息
spki/sdsi2.0 is the most popular trust management system at present. But in spki/SD-SI2.0, as long as a principal provides a valid certificate chain to the server, it may be authorized letting the resource owner's will alone, so the security property of the system can't be maintained. In this paper, we present a proof-of-compliance mechanism of spki/sdsi2.0 using constraint in order to enhance the degree of control over the resource for the owner. This mechanism, which is simple and flexible and easy to implement, can largely improve the security property of the distributed access control.
暂无评论