A Java API for X.509 Proxy Certificates

Saved in:
Bibliographic Details
Title: A Java API for X.509 Proxy Certificates
Authors: John Gilbert, Russell Perry, Hewlett Packard Laboratories
Contributors: The Pennsylvania State University CiteSeerX Archives
Source: http://www.hpl.hp.com/techreports/2008/HPL-2008-77.pdf.
Collection: CiteSeerX
Subject Terms: Delegation, Public Key Infrastructure, Grid Security Infrastructure, SSL, HTTPS, Java Cryptography Architecture, Java Secure Sockets Extension
Description: X.509 Proxy Certificates have been proposed for use in the Grid Security Infrastructure to allow dynamic delegation of rights and single sign-on for end users. We have evaluated proxy certificates to secure a service-oriented architecture for digital content based on Web Services. We describe how support for proxy certificates was implemented in Java through extensions to the Java Cryptography API and related security APIs. The principal challenges involved providing control over which proxy certificate to use per SSL connection, validating proxy certificate chains and supporting runtime generation of proxy certificates.
Document Type: text
File Description: application/pdf
Language: English
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.408.9288
Availability: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.408.9288
http://www.hpl.hp.com/techreports/2008/HPL-2008-77.pdf
Rights: Metadata may be used without restrictions as long as the oai identifier remains attached to it.
Accession Number: edsbas.7FD3FDAF
Database: BASE
Description
Abstract:X.509 Proxy Certificates have been proposed for use in the Grid Security Infrastructure to allow dynamic delegation of rights and single sign-on for end users. We have evaluated proxy certificates to secure a service-oriented architecture for digital content based on Web Services. We describe how support for proxy certificates was implemented in Java through extensions to the Java Cryptography API and related security APIs. The principal challenges involved providing control over which proxy certificate to use per SSL connection, validating proxy certificate chains and supporting runtime generation of proxy certificates.