DocumentCode :
3050040
Title :
Identity Management without Revocation
Author :
Fongen, Anders
Author_Institution :
Norwegian Defence Res. Establ., Norway
fYear :
2010
fDate :
18-25 July 2010
Firstpage :
75
Lastpage :
81
Abstract :
Key revocation in mobile and tactical network environments remains a hard problem due to the required amount of connectivity and network bandwidth. Still, authenticity and integrity of messages are primary requirements in a tactical operation, so identity management must be offered in some form. Besides, tactical operations are organized as coalitions, where autonomous domains manage their services, identities and access control policies, and yet want to offer their services to clients in other domains. This requires that the identity management operating in the tactical zone is able to authenticate principals and control access privileges across security domains. For the sole purpose of authentication (and subsequent access control), authentication protocols are often over-engineered since they also provide privacy protection, DOS protection and even non-repudiation. Extraneous services bloat the protocol and introduce unnecessary traffic. This paper presents a cross domain identity management protocol which relies on less connectivity, sends fewer messages and maintains a weaker binding between domain authorities. It obtains this through the replacement of public key certificates with identity statements which are shortlived bindings between identity, attributes and public key. Identity statements do not offer a revocation mechanism and circumvent the familiar certificate validation problem. The increased focus on the importance of authenticated and unmodified messages, and the growing interest in mobile application makes this contribution relevant also for civilian research, e.g. in rescue networks.
Keywords :
cryptographic protocols; data privacy; message authentication; public key cryptography; DOS protection; access control policy; authentication protocol; identity management; messages integrity; privacy protection; public key certificate; revocation mechanism; Access control; Authentication; Mobile communication; Protocols; Public key; Servers; certificate revocation; identity management;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Emerging Security Information Systems and Technologies (SECURWARE), 2010 Fourth International Conference on
Conference_Location :
Venice
Print_ISBN :
978-1-4244-7517-9
Electronic_ISBN :
978-0-7695-4095-5
Type :
conf
DOI :
10.1109/SECURWARE.2010.20
Filename :
5633653
Link To Document :
بازگشت