Skip to main content

A review of the SESAME development

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1438))

Included in the following conference series:

Abstract

The development of the SESAME (Secure European System for Applications in a Multi-vendor Environment) security concept started approximately a decade ago. The flexibility and scalability properties, the focus on simple administration and the modular structure are some of the reasons why this architecture has formed the basis for several security products. This paper attempts to make a short summary of the SESAME development from its infancy to TrustedWeb, the latest solution particularly adapted for the administration and protection of Web-resources in large intra- and extranet environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ISO 7498-2: Information Processing Systems — Open Systems Interconnection — Basic Reference Model — Part 2: Security Architecture (1984).

    Google Scholar 

  2. ISO/IEC 10181: Information Technology — Open Systems Interconnection — Security Frameworks, Part 1 — Part 7 (1996).

    Google Scholar 

  3. ITU-T Recommendation X.509: The Directory — Authentication Framework (1988) (Version 1).

    Google Scholar 

  4. ITU-T Recommendation X.509: The Directory — Authentication Framework (1996) (Version 3).

    Google Scholar 

  5. ECMA TR/46: Security in Open Systems — A Security Framework (July 1988).

    Google Scholar 

  6. ECMA-138: (now replaced by ECMA-219 [7]) Security in Open Systems — Data Elements and Service Definitions, (December 1989).

    Google Scholar 

  7. ECMA-219: Authentication and Privilege Attribute Security Application with related Key Distribution Functions — Part 1, 2 and 3 2nd edition (March 1996).

    Google Scholar 

  8. Ashley, P.: Authorization For A Large Heterogeneous Multi-Domain System, AUUG 1997 National Conference, Brisbane, September 1–5 (1997).

    Google Scholar 

  9. Ashley, P., and Broom, B.: A Survey of Secure Multi-Domain Distributed Architectures FIT Technical Report FIT-TR-97-08, August 9 (1997).

    Google Scholar 

  10. SESAME Home Page: http://www.esat.kuleuven.ac.be/cosic/sesame.html.

    Google Scholar 

  11. Kaijser, P., Parker, T., and Pinkas, D.: SESAME: The Solution to Security for Open Distributed Systems. Computer Communications 17 (7): 501–518 (1994).

    Article  Google Scholar 

  12. ECMA-206: Association Context Management including Security Context Management (December 1993).

    Google Scholar 

  13. ECMA-235: The ECMA GSS-API Mechanism (March 1995).

    Google Scholar 

  14. Internet X.509 Public Key Infrastructure Certificate Management Protocols, Internet Draft (February 1998).

    Google Scholar 

  15. RFC 1509: Generic Security Service API.

    Google Scholar 

  16. See http://www.ism.bull.net.

    Google Scholar 

  17. See http://www.daisorb.com.

    Google Scholar 

  18. See http://www.sse.ie.

    Google Scholar 

  19. See http://www.trustedweb.com.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Colin Boyd Ed Dawson

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kaijser, P. (1998). A review of the SESAME development. In: Boyd, C., Dawson, E. (eds) Information Security and Privacy. ACISP 1998. Lecture Notes in Computer Science, vol 1438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053716

Download citation

  • DOI: https://doi.org/10.1007/BFb0053716

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64732-4

  • Online ISBN: 978-3-540-69101-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics