A Java API for X.509 Proxy Certificates

Gespeichert in:
Bibliographische Detailangaben
Titel: A Java API for X.509 Proxy Certificates
Autoren: John Gilbert, Russell Perry, Hewlett Packard Laboratories
Weitere Verfasser: The Pennsylvania State University CiteSeerX Archives
Quelle: http://www.hpl.hp.com/techreports/2008/HPL-2008-77.pdf.
Bestand: CiteSeerX
Schlagwörter: Delegation, Public Key Infrastructure, Grid Security Infrastructure, SSL, HTTPS, Java Cryptography Architecture, Java Secure Sockets Extension
Beschreibung: X.509 Proxy Certificates have been proposed for use in the Grid Security Infrastructure to allow dynamic delegation of rights and single sign-on for end users. We have evaluated proxy certificates to secure a service-oriented architecture for digital content based on Web Services. We describe how support for proxy certificates was implemented in Java through extensions to the Java Cryptography API and related security APIs. The principal challenges involved providing control over which proxy certificate to use per SSL connection, validating proxy certificate chains and supporting runtime generation of proxy certificates.
Publikationsart: text
Dateibeschreibung: application/pdf
Sprache: English
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.408.9288
Verfügbarkeit: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.408.9288
http://www.hpl.hp.com/techreports/2008/HPL-2008-77.pdf
Rights: Metadata may be used without restrictions as long as the oai identifier remains attached to it.
Dokumentencode: edsbas.7FD3FDAF
Datenbank: BASE
Beschreibung
Abstract:X.509 Proxy Certificates have been proposed for use in the Grid Security Infrastructure to allow dynamic delegation of rights and single sign-on for end users. We have evaluated proxy certificates to secure a service-oriented architecture for digital content based on Web Services. We describe how support for proxy certificates was implemented in Java through extensions to the Java Cryptography API and related security APIs. The principal challenges involved providing control over which proxy certificate to use per SSL connection, validating proxy certificate chains and supporting runtime generation of proxy certificates.