Check out the new USENIX Web site. next up previous
Next: Access-request protocol Up: Protocol description Previous: Protocol description

Certificate creation

Before a protocol run can take place the delegator (file owner) creates a delegation certificate. This delegation certificate contains a digital signature that vouches for his delegation of access rights for a particular file to the other user. The certificate grants the delegatee access to the file. The certificate components that can easily be conveyed verbally are the following:

The verbal delegation ends with the exchange of the bits resembling the signature. Together with the other information exchanged, the signature enables the delegatee to (re)construct a machine readable representation of the certificate. These certificates, obviously, must be readable not only by computers but also by humans. To facilitate this, certificates are encoded in a syntax similar to SDSI [12].



Tage Stabell-Kulo
1999-07-06