Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Title:||Policy Specification and Enforcement for Smart ID Cards Deployment|
|Published:||June 03, 2008|
|Abstract:||Deployment of Smart Cards for Identity Verification requires collection of credentials and provisioning of credentials from and to heterogeneous and sometimes legacy systems. To facilitate this process, a centralized identity store called Identity Management System (IDMS) is often used. To protect the integrity, confidentiality and privacy of the credential data that is collected, stored and disseminated through IDMS, a sophisticated set of policies governing data flows, processing and distribution are required. In this paper, we present a policy specification and enforcement framework using XML, XML Schemas and XSLT that was developed for secure management of the infrastructure system used for a large scale smart ID card deployment.|
|Conference:||IEEE Workshop on Policies for Distributed Systems and Networks (IEEE Policy 2008)|
|Dates:||June 2-4, 2008|
|Keywords:||Credentials Provisioning, XML Schema, XSLT|
|PDF version:||Click here to retrieve PDF version of paper (178KB)|