Privacy enhanced access control by SPKI

T. Saito, K. Umesawa, Hiroshi G. Okuno

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)


In Internet and electronic commerce applications, a user may want to access servers as anonymous with an authorized certificate. In this paper, such privacy-enhanced service scheme is presented by using Simple Public Key Infrastructure (SPKI). A certificate of SPKI carries as few information on clients as possible compared to a certificate of PKIX (Public Key Infrastructure with X.509). After obtaining a certificate issued by an authorized server, a client submits the certificate to the service provider (server) in order to take services associated with the certificate. Then, the provider verifies the submitted certificate and gives permission to the client if verified. A client can delegate a certificate to a third party, so that he/she can access the server instead of the original certificate recipient. The implementation of the proposed certificate-based access control consists of authorized server, issuing agent, client. These are based on SPKI certificate issuer, certificate verifier, access control list management, and delegate mechanism. These subsystems are coded on the basis of SPKI library written in Java.

Original languageEnglish
Title of host publicationProceedings - 7th International Conference on Parallel and Distributed Systems: Workshops
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages6
ISBN (Print)0769505716, 9780769505718
Publication statusPublished - 2000
Externally publishedYes
Event7th International Conference on Parallel and Distributed Systems, ICPADS 2000 - Iwate, Japan
Duration: 2000 Jul 42000 Jul 7


Other7th International Conference on Parallel and Distributed Systems, ICPADS 2000

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture


Dive into the research topics of 'Privacy enhanced access control by SPKI'. Together they form a unique fingerprint.

Cite this