DocumentCode
3050040
Title
Identity Management without Revocation
Author
Fongen, Anders
Author_Institution
Norwegian Defence Res. Establ., Norway
fYear
2010
fDate
18-25 July 2010
Firstpage
75
Lastpage
81
Abstract
Key revocation in mobile and tactical network environments remains a hard problem due to the required amount of connectivity and network bandwidth. Still, authenticity and integrity of messages are primary requirements in a tactical operation, so identity management must be offered in some form. Besides, tactical operations are organized as coalitions, where autonomous domains manage their services, identities and access control policies, and yet want to offer their services to clients in other domains. This requires that the identity management operating in the tactical zone is able to authenticate principals and control access privileges across security domains. For the sole purpose of authentication (and subsequent access control), authentication protocols are often over-engineered since they also provide privacy protection, DOS protection and even non-repudiation. Extraneous services bloat the protocol and introduce unnecessary traffic. This paper presents a cross domain identity management protocol which relies on less connectivity, sends fewer messages and maintains a weaker binding between domain authorities. It obtains this through the replacement of public key certificates with identity statements which are shortlived bindings between identity, attributes and public key. Identity statements do not offer a revocation mechanism and circumvent the familiar certificate validation problem. The increased focus on the importance of authenticated and unmodified messages, and the growing interest in mobile application makes this contribution relevant also for civilian research, e.g. in rescue networks.
Keywords
cryptographic protocols; data privacy; message authentication; public key cryptography; DOS protection; access control policy; authentication protocol; identity management; messages integrity; privacy protection; public key certificate; revocation mechanism; Access control; Authentication; Mobile communication; Protocols; Public key; Servers; certificate revocation; identity management;
fLanguage
English
Publisher
ieee
Conference_Titel
Emerging Security Information Systems and Technologies (SECURWARE), 2010 Fourth International Conference on
Conference_Location
Venice
Print_ISBN
978-1-4244-7517-9
Electronic_ISBN
978-0-7695-4095-5
Type
conf
DOI
10.1109/SECURWARE.2010.20
Filename
5633653
Link To Document