Dartmouth College Computer Science
Technical Report series
TR search TR listserv
|By author:||A B C D E F G H I J K L M N O P Q R S T U V W X Y Z|
|By number:||2017, 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007, 2006, 2005, 2004, 2003, 2002, 2001, 2000, 1999, 1998, 1997, 1996, 1995, 1994, 1993, 1992, 1991, 1990, 1989, 1988, 1987, 1986|
The Shibboleth middleware from Internet2 provides a way for
users at higher-education institutions to access remote electronic
content in compliance with the inter-institutional license agreements
that govern such access. To protect end-user privacy, Shibboleth
permits users to construct attribute release policies that control
what user credentials a given content provider can obtain. However,
Shibboleth leaves unspecified how to construct these policies.
To be effective, a solution needs to accommodate the typical nature of a university: a set of decentralized fiefdoms. This need argues for a public-key infrastructure (PKI) approach---since public-key cryptography does not require parties to agree on a secret beforehand, and parties distributed throughout the institution are unlikely to agree on anything. However, this need also argues against the strict hierarchical structure of traditional PKI---policy in different fiefdoms will be decided differently, and originate within the fiefdom, rather than from an overall root.
This paper presents our design and prototype of a system that uses the decentralized public-key framework of SPKI/SDSI to solve this problem.
Bibliographic citation for this report: [plain text] [BIB] [BibTeX] [Refer]
Or copy and paste:
Sidharth Nazareth and Sean Smith, "Using SPKI/SDSI for Distributed Maintenance of Attribute Release Policies in Shibboleth." Dartmouth Computer Science Technical Report TR2004-485, January 2004.
Notify me about new tech reports.
Search the technical reports.
To receive paper copy of a report, by mail, send your address and the TR number to reports AT cs.dartmouth.edu
Copyright notice: The documents contained in this server are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.
Technical reports collection maintained by David Kotz.