Privilege Management Infrastructure

Privilege Management Infrastructure

Darren P. Mundy (University of Hull, UK) and Oleksandr Otenko (University of Kent, UK)
Copyright: © 2005 |Pages: 6
DOI: 10.4018/978-1-59140-561-0.ch120
OnDemand PDF Download:
No Current Special Offers


Public Key Infrastructures (PKI) are now in place in a number of organizations, and there is a wide amount of material available that can be used to obtain familiarisation with the concept (Adams & Lloyd, 2002; Housley & Polk, 2001; Nash, Brink, & Duane, 2001). Although related to PKI, Privilege Management Infrastructure (PMI) is a recent development in the network security field. PMI has been designed to supply the authorization function lacking in the PKI model. This article will provide an overview of PMI, state the relationship between PKI and PMI, and will finally provide a number of examples of present PMI architectures such as PERMIS (Chadwick & Otenko, 2002), OASIS Active Security (Yao, Moody, & Bacon, 2001) and AKENTI (Thompson, Essari, & Mudumbai, 2003).

Complete Chapter List

Search this Book: