Skip to main content

The RBAC Based Privilege Management for Authorization of Wireless Networks

  • Conference paper
  • 418 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2762))

Abstract

M-commerce have grown rapidly, it is very important to determine whether an identity is permitted to access a resource in mobile environments. In this paper we propose RBAC based Wireless Privilege Management Infrastructure (WPMI) model and Wireless Attribute Certificate (WAC) for authorization in mobile communication. All access control decisions are driven by an authorization policy, which is itself stored in an WAC. Authorization policies are written in XML according to a DTD that has been published at XML.org. Finally we show the effectiveness of the proposed RBAC by applying it to an example of M-commerce service.

This work is supported by the Ministry of Information & Communication of Korea and by the sabbatical leave of the SoonChunHyang University.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Arsenault, A., Turner, S.: Internet X.509 Public Key Infrastructure PKIX Roadmap Work in Progress. Internet-draft 05 (March 2000), http://www.ietf.org/internet-drafts/draft-ietf-pkix-roadmap-05.txt

  2. Adams, C., Lloyd, S.: Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations. Macmillan Technical Publishing (1999)

    Google Scholar 

  3. ITU-T Rec.: X.509 2000 |ISO/IEC 9594-8 The Directory: Authentication Framework

    Google Scholar 

  4. Housley, R., Ford, W., Polk, T., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and CRL Profile. RFC 2459, IETF PKIX Working Group (January 1999), http://www.ietf.org/rfc/rfc2459.txt

  5. Aresenault, A., Tuner, S.: Internet X.509 Public Key Infrastructure, Internet Draft (November 2000)

    Google Scholar 

  6. Lee, J.I., Park, J.H., Song, J.S.: Domestic PKI model forWAP. Institute of Information Security & Cryptology Journal (October 2000)

    Google Scholar 

  7. Wireless Application Protocol Wireless Transport Layer Security, WAP Forum 6th of (April 2001)

    Google Scholar 

  8. Jin, S.H., Choi, D.S., Cho, Y.S., Yoon, E.J.: Attribute Authentication technology & PMI. Institute of Information Security & Cryptology Journal (December 2000)

    Google Scholar 

  9. Farrell, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization, Internet Draft (June 2001)

    Google Scholar 

  10. Farrell, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization, RFC 3281 (April 2002), available on line at http://www.ietf.org/rfc/rfc3281.txt

  11. ISO/IEC 9594-8/ITU-T Recommendation X.509, Information Technology-Open System Interconnection: The Directory: Authentication Framework (2002)

    Google Scholar 

  12. Park, D.G., Hwang, Y.D.: RBAC in Distributed Retrieving Systems by Attribute Certificates. In: IC2001 (2001)

    Google Scholar 

  13. Knight, S., Grandy, C.: Scalability Issues in PMI Delegation. In: 1st Annual PKI Research Workshop-proceedings (April 2002)

    Google Scholar 

  14. Park, J.S., Sandhu, R.: Binding Identities and Attributes Using Digitally Signed Certificates. In: ACSAC 2000 (2000)

    Google Scholar 

  15. Chadwick, D.W., Otenko, O.: The PERMIS X.509 Role based Privilege Management Infrastructure. In: SACMAT2002 (2002)

    Google Scholar 

  16. Chadwick, D.W., Otenko, A.: RBAC Polices in XML for X.509 based Privilege Management. In: Sec 2000 (2000)

    Google Scholar 

  17. Chadwick, D.W.: Privilege Management Infrastructure. Business Briefing: Global Security Systems Reference Section

    Google Scholar 

  18. Park, D.G., Lee, Y.R.: The PMI model for the wireless environment. In: KOCIES Conference 2002 (2002)

    Google Scholar 

  19. Nykanen, T.: Attribute Certificate in X.509. HUT TML, Tik-110.501 Seminar on Network Security (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, DG., Lee, YR. (2003). The RBAC Based Privilege Management for Authorization of Wireless Networks. In: Dong, G., Tang, C., Wang, W. (eds) Advances in Web-Age Information Management. WAIM 2003. Lecture Notes in Computer Science, vol 2762. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45160-0_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45160-0_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40715-7

  • Online ISBN: 978-3-540-45160-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics