Solving identity delegation problem in the e-government environment
Autor: | Ana Gómez Oliva, Iván Pau de la Cruz, Sergio García, Emilia Pérez Belleboni |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2011 |
Předmět: |
Delegate
Computer Networks and Communications Computer science media_common.quotation_subject Internet privacy 0211 other engineering and technologies Cryptography 02 engineering and technology Computer security computer.software_genre Security token 0202 electrical engineering electronic engineering information engineering Safety Risk Reliability and Quality media_common Informática 021110 strategic defence & security studies Government Telecomunicaciones Delegation business.industry 16. Peace & justice Digital identity Identity (object-oriented programming) 020201 artificial intelligence & image processing The Internet business computer Software Information Systems |
Zdroj: | International Journal of Information Security, ISSN 1615-5262, 2011, Vol. 10, No. 6 Archivo Digital UPM Universidad Politécnica de Madrid |
Popis: | At present, many countries allow citizens or entities to interact with the government outside the telematic environment through a legal representative who is granted powers of representation. However, if the interaction takes place through the Internet, only primitive mechanisms of representation are available, and these are mainly based on non-dynamic offline processes that do not enable quick and easy identity delegation. This paper proposes a system of dynamic delegation of identity between two generic entities that can solve the problem of delegated access to the telematic services provided by public authorities. The solution herein is based on the generation of a delegation token created from a proxy certificate that allows the delegating entity to delegate identity to another on the basis of a subset of its attributes as delegator, while also establishing in the delegation token itself restrictions on the services accessible to the delegated entity and the validity period of delegation. Further, the paper presents the mechanisms needed to either revoke a delegation token or to check whether a delegation token has been revoked. Implications for theory and practice and suggestions for future research are discussed. |
Databáze: | OpenAIRE |
Externí odkaz: |