6,538 research outputs found

    The PERMIS X.509 Based Privilege Management Infrastructure

    Get PDF
    This document describes the PERMIS X.509 Based Privilege Management Infrastructure, which is a trust management system as described in RFC 2704 [2]. The PERMIS Infrastructure is compared with the AAA Authorisation Framework described in RFC 2904 [4], and is shown to be compatible with it

    Internet X.509 Public Key Infrastructure Operational Protocols -- LDAPv3

    Get PDF
    This document describes the features of the Lightweight Directory Access Protocol v3 that are needed in order to support a public key infrastructure based on X.509 certificates and CRLs

    A Method for Collecting Case Study Information via the Internet

    Get PDF
    The Internet is rapidly becoming the communications infrastructure. With its advantages of speed, availability, and `different time, different place' mode of communication, it can be successfully harnessed to accomplish tasks that previously required face-to-face meetings. Such meetings can consume large travel budgets and staff time, and therefore alternative mechanisms that achieve the same results for less cost should be welcomed. One of these new uses of the Internet is to collect case study material. This paper presents a method that has been successfully employed by the author to collect 15 case studies of X.500 implementations. The method described herein consists of three phases: preparation, correspondence and documentation phases. Each of the phases is described, and the author also presents useful tips that he gained during the course of his studies. The method should provide future researchers with a framework which can be successfully employed to productively utilise the resources of the Internet

    Important Lessons Derived from X.500 Case Studies

    Get PDF
    X.500 is a new and complex electronic directory technology, whose basic specification was first published as an international standard in 1988, with an enhanced revision in 1993. The technology is still unproven in many organisations. This paper presents case studies of 15 pioneering pilot and operational X.500 based directory services. The paper provides valuable insights into how organisations are coming to understand this new technology, are using X.500 for both traditional and novel directory based services, and consequently are deriving benefits from it. Important lessons that have been learnt by these X.500 pioneers are presented here, so that future organisations can benefit from their experiences. Factors critical to the success of implementing X.500 in an organisation are derived from the studies

    Enabling the Internet White Pages Service -- the Directory Guardian

    Get PDF
    The Internet White Pages Service (IWPS) has been slow to materialise for many reasons. One of them is the security concerns that organisations have, over allowing the public to gain access to either their Intranet or their directory database. The Directory Guardian is a firewall application proxy for X.500 and LDAP protocols that is designed to alleviate these fears. Sitting in the firewall system, it filters directory protocol messages passing into and out of the Intranet, allowing security administrators to carefully control the amount of directory information that is released to the outside world. This paper describes the design of our Guardian system, and shows how relatively easy it is to configure its filtering capabilities. Finally the paper describes the working demonstration of the Guardian that was built for the 1997 World Electronic Messaging Association directory challenge. This linked the WEMA directory to the NameFLOWParadise Internet directory, and demonstrated some of the powerful filtering capabilities of the Guardian

    Distributed Key Management for Secure Role Based Messaging

    Get PDF
    Secure Role Based Messaging (SRBM) augments messaging systems with role oriented communication in a secure manner. Role occupants can sign and decrypt messages on behalf of roles. This paper identifies the requirements of SRBM and recognises the need for: distributed key shares, fast membership revocation, mandatory security controls and detection of identity spoofing. A shared RSA scheme is constructed. RSA keys are shared and distributed to role occupants and role gate keepers. Role occupants and role gate keepers must cooperate together to use the key shares to sign and decrypt the messages. Role occupant signatures can be verified by an audit service. A SRBM system architecture is developed to show the security related performance of the proposed scheme, which also demonstrates the implementation of fast membership revocation, mandatory security control and prevention of spoofing. It is shown that the proposed scheme has successfully coupled distributed security with mandatory security controls to realize secure role based messaging

    LEED studies of lead on copper (100)

    Get PDF
    Lead layers on copper (100) at coverages from 0.5 to 0.6 were investigated by quantitative LEED and AES measurements and dynamical LEED calculations. Comparisons of intensity measurements with dynamical calculations for the (Wurzel2 x Wurzel2)R45° structure show that the Pb atoms are adsorbed in hollow sites. The Cu---Pb distance is close to the sum of both metallic radii. The dense lead monolayer at a coverage of 0.6 exhibits a c(5 Wurzel2 x Wurzel2)R45° superstructure with cmm symmetry of the diffraction pattern. Calculations for five models were performed under variation of several geometric parameters. Most analogies were found for regular arrangements of distorted (Wurzel2 x Wurzel2)R45° domains, separated by antiphase boundaries. This result is in consistency with observations of poorly ordered (Wurzel2 x Wurzel2)R45° antiphase domains at intermediate coverages
    corecore