File Download
There are no files associated with this item.
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: The delegation problem and practical pki-based solutions
Title | The delegation problem and practical pki-based solutions |
---|---|
Authors | |
Keywords | Delegation Information Systems Security Public Key Infrastructure (PKI) |
Issue Date | 2004 |
Publisher | ICEIS. |
Citation | Iceis 2004 - Proceedings Of The Sixth International Conference On Enterprise Information Systems, 2004, p. 73-78 How to Cite? |
Abstract | Delegation is a process where a delegator grants or authorizes all or some of his/her power to another a delegate to work on his/her behalf. In an office, it is common for officers to delegate their power to subordinates. In a digital environment (e.g. a secure enterprise information system with confidential electronic documents), how delegation can be handled properly is still an open question. In this paper, we address the delegation problem in the context of a secure information system, lay down a set of requirements from the users' point of view and propose several practical PKI-based schemes to solve the problem. Analysis on the proposed schemes concludes that Proxy Memo can solve the problem quite efficiently while reducing the key management problem. |
Persistent Identifier | http://hdl.handle.net/10722/93332 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cheung, VLS | en_HK |
dc.contributor.author | Hui, LCK | en_HK |
dc.contributor.author | Yiu, SM | en_HK |
dc.date.accessioned | 2010-09-25T14:57:53Z | - |
dc.date.available | 2010-09-25T14:57:53Z | - |
dc.date.issued | 2004 | en_HK |
dc.identifier.citation | Iceis 2004 - Proceedings Of The Sixth International Conference On Enterprise Information Systems, 2004, p. 73-78 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/93332 | - |
dc.description.abstract | Delegation is a process where a delegator grants or authorizes all or some of his/her power to another a delegate to work on his/her behalf. In an office, it is common for officers to delegate their power to subordinates. In a digital environment (e.g. a secure enterprise information system with confidential electronic documents), how delegation can be handled properly is still an open question. In this paper, we address the delegation problem in the context of a secure information system, lay down a set of requirements from the users' point of view and propose several practical PKI-based schemes to solve the problem. Analysis on the proposed schemes concludes that Proxy Memo can solve the problem quite efficiently while reducing the key management problem. | en_HK |
dc.language | eng | en_HK |
dc.publisher | ICEIS. | en_HK |
dc.relation.ispartof | ICEIS 2004 - Proceedings of the Sixth International Conference on Enterprise Information Systems | en_HK |
dc.subject | Delegation | en_HK |
dc.subject | Information Systems Security | en_HK |
dc.subject | Public Key Infrastructure (PKI) | en_HK |
dc.title | The delegation problem and practical pki-based solutions | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.email | Hui, LCK:hui@cs.hku.hk | en_HK |
dc.identifier.email | Yiu, SM:smyiu@cs.hku.hk | en_HK |
dc.identifier.authority | Hui, LCK=rp00120 | en_HK |
dc.identifier.authority | Yiu, SM=rp00207 | en_HK |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.scopus | eid_2-s2.0-8444228211 | en_HK |
dc.identifier.hkuros | 92292 | en_HK |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-8444228211&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.spage | 73 | en_HK |
dc.identifier.epage | 78 | en_HK |
dc.identifier.scopusauthorid | Cheung, VLS=36906037200 | en_HK |
dc.identifier.scopusauthorid | Hui, LCK=8905728300 | en_HK |
dc.identifier.scopusauthorid | Yiu, SM=7003282240 | en_HK |