privilege management infrastructure
Recently Published Documents


TOTAL DOCUMENTS

21
(FIVE YEARS 0)

H-INDEX

5
(FIVE YEARS 0)

2012 ◽  
Vol 241-244 ◽  
pp. 3125-3129 ◽  
Author(s):  
Jin Li

For analyzing the multilayer structure of the J2EE, based on Role-Based Access Control, a model of privilege management infrastructure was designed. It was implemented after the discussion of the existing privilege management system. Moreover, the safe authority control was realized with good effect.


Author(s):  
Darren P. Mundy ◽  
Oleksandr Otenko

Public Key Infrastructures (PKI) are now in place in a number of organizations, and there is a wide amount of material available that can be used to obtain familiarisation with the concept (Adams & Lloyd, 2002; Housley & Polk, 2001; Nash, Brink, & Duane, 2001). Although related to PKI, Privilege Management Infrastructure (PMI) is a recent development in the network security field. PMI has been designed to supply the authorization function lacking in the PKI model. This article will provide an overview of PMI, state the relationship between PKI and PMI, and will finally provide a number of examples of present PMI architectures such as PERMIS (Chadwick & Otenko, 2002), OASIS Active Security (Yao, Moody, & Bacon, 2001) and AKENTI (Thompson, Essari, & Mudumbai, 2003).


Author(s):  
Darren P. Mundy ◽  
Oleksandr Otenko

Public key infrastructures (PKI) are now in place in a number of organizations and there is a vast amount of material available that can be used to obtain familiarisation with the concept (Adams & Lloyd, 2002; Raina, 2003). Although related to PKI, privilege management infrastructure (PMI) is a more recent development in the network security field. PMI has been designed to supply the authorization function lacking in the PKI model. This article will provide an overview of PMI, will provide a number of examples of present PMI architectures, such as PERMIS (Chadwick, Zhao, Otenko, Laborde, Su, & Nguyen, 2006), AKENTI (Thompson, Essari, & Mudumbai, 2003), and Shibboleth (Carmody, 2001), and will provide some examples of practical PMI usage.


Sign in / Sign up

Export Citation Format

Share Document