Anonymous Context Based Role Activation Mechanism
Privacy is not an explicit goal of traditional authorisation mechanisms. The contribution of this paper is an authorisation mechanism which takes identity out of the trust management envelope. Our protocol supports weak versions of anonymity and is useful even if anonymity is not required, due to the ability to weaken trust assumptions.
KeywordsRing Signature Access Control Policy Trading Server Role Base Access Control Administrative Server
Unable to display preview. Download preview PDF.
- 1.Belokosztolszki, A.: Role based access control policy administration. Technical Report 586, University of Cambridge (2004)Google Scholar
- 2.Beresnevichiene, Y.: A role and context based security model. Technical Report 558, University of Cambridge (2003)Google Scholar
- 4.Ferraiolo, D., Sandhu, R., Gavrilla, S., Kuhn, R., Chandramouli, R.: Proposed NIST Standard For Role Based Access Control. ACM Transactions on Information and Systems Security 4(3), 224–274Google Scholar
- 6.Neuman, B.C., Tso’s, T.: Kerberos: An Authentication Service For Computer Networks. IEEE Communications 32(9), 33–38Google Scholar