Skip to main content

An Authorization Model for a Public Key Management Service

Publication ,  Journal Article
Samarati, P; Reiter, MK; Jajodia, S
Published in: ACM Transactions on Information and System Security
January 1, 2001

Public key management has received considerable attention from both the research and commercial communities as a useful primitive for secure electronic commerce and secure communication. While the mechanics of certifying and revoking public keys and escrowing and recovering private keys have been widely explored, less attention has been paid to access control frameworks for regulating access to stored keys by different parties. In this article we propose such a framework for a key management service that supports public key registration, lookup, and revocation, and private key escrow, protected use (e.g., to decrypt selected messages), and recovery.We propose an access control model using a policy based on principal, ownership, and authority relationships on keys. The model allows owners to grant to others (and revoke) privileges to execute various actions on their keys. The simple authorization language is very expressive, enabling the specification of authorizations for composite subjects that can be fully specified (ground) or partially specified, thus making the authorizations applicable to all subjects satisfying some conditions. We illustrate how the access control policy and the authorizations can easily be expressed through a simple and restricted, hence efficiently computable, form of logic language. © 2001, ACM. All rights reserved.

Duke Scholars

Altmetric Attention Stats
Dimensions Citation Stats

Published In

ACM Transactions on Information and System Security

DOI

EISSN

1557-7406

ISSN

1094-9224

Publication Date

January 1, 2001

Volume

4

Issue

4

Start / End Page

453 / 482

Related Subject Headings

  • Strategic, Defence & Security Studies
  • 4609 Information systems
  • 4604 Cybersecurity and privacy
  • 0806 Information Systems
  • 0804 Data Format
  • 0803 Computer Software
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Samarati, P., Reiter, M. K., & Jajodia, S. (2001). An Authorization Model for a Public Key Management Service. ACM Transactions on Information and System Security, 4(4), 453–482. https://doi.org/10.1145/503339.503343
Samarati, P., M. K. Reiter, and S. Jajodia. “An Authorization Model for a Public Key Management Service.” ACM Transactions on Information and System Security 4, no. 4 (January 1, 2001): 453–82. https://doi.org/10.1145/503339.503343.
Samarati P, Reiter MK, Jajodia S. An Authorization Model for a Public Key Management Service. ACM Transactions on Information and System Security. 2001 Jan 1;4(4):453–82.
Samarati, P., et al. “An Authorization Model for a Public Key Management Service.” ACM Transactions on Information and System Security, vol. 4, no. 4, Jan. 2001, pp. 453–82. Scopus, doi:10.1145/503339.503343.
Samarati P, Reiter MK, Jajodia S. An Authorization Model for a Public Key Management Service. ACM Transactions on Information and System Security. 2001 Jan 1;4(4):453–482.

Published In

ACM Transactions on Information and System Security

DOI

EISSN

1557-7406

ISSN

1094-9224

Publication Date

January 1, 2001

Volume

4

Issue

4

Start / End Page

453 / 482

Related Subject Headings

  • Strategic, Defence & Security Studies
  • 4609 Information systems
  • 4604 Cybersecurity and privacy
  • 0806 Information Systems
  • 0804 Data Format
  • 0803 Computer Software