Published: June 03, 2008
Author(s)
Ramaswamy Chandramouli
Conference
Name: IEEE Workshop on Policies for Distributed Systems and Networks (IEEE Policy 2008)
Dates: June 2-4, 2008
Location: Palisades, New York, United States
Citation: Proceedings of the 2008 IEEE Workshop on Policies for Distributed Systems and Networks (POLICY 2008), pp. 127-134
Announcement
Deployment of Smart Cards for Identity Verification requires collection of credentials and provisioning of credentials from and to heterogeneous and sometimes legacy systems. To facilitate this process, a centralized identity store called Identity Management System (IDMS) is often used. To protect the integrity, confidentiality and privacy of the credential data that is collected, stored and disseminated through IDMS, a sophisticated set of policies governing data flows, processing and distribution are required. In this paper, we present a policy specification and enforcement framework using XML, XML Schemas and XSLT that was developed for secure management of the infrastructure system used for a large scale smart ID card deployment.
Deployment of Smart Cards for Identity Verification requires collection of credentials and provisioning of credentials from and to heterogeneous and sometimes legacy systems. To facilitate this process, a centralized identity store called Identity Management System (IDMS) is often used. To protect...
See full abstract
Deployment of Smart Cards for Identity Verification requires collection of credentials and provisioning of credentials from and to heterogeneous and sometimes legacy systems. To facilitate this process, a centralized identity store called Identity Management System (IDMS) is often used. To protect the integrity, confidentiality and privacy of the credential data that is collected, stored and disseminated through IDMS, a sophisticated set of policies governing data flows, processing and distribution are required. In this paper, we present a policy specification and enforcement framework using XML, XML Schemas and XSLT that was developed for secure management of the infrastructure system used for a large scale smart ID card deployment.
Hide full abstract
Keywords
credentials provisioning; XML Schema; XSLT
Control Families
None selected