Enhancements on proxy certification for dynamic delegation

  • 26 Mar 2022
  • Published Resarch - Informatics & Communication


Moutasem Shafa'amry and Nisreen Alam Aldeen

Published in

2nd EUROPEAN COMPUTING CONFERENCE (ECC’08), Malta, September 2008.



Today, most of the e-applications and services (mainly e-banking, e-government e-commerce, e-business and grid applications) require authentication and secure access. Some of these services allow delegation. The X.509 Proxy Certificate is considered the most common technique of delegation in use today. It is proposed as a partial solution to resolve some problems of existing certification system. X.509 Proxy Certificates have been defined and standardized for the purpose of providing restricted proxying and delegation within a PKI-based authentication system. This paper deals with this delegation mechanism, as it reviews a series of conceptual, legal and implementation features, and problems for this type with its pros and cons regarding security and privacy communication. We explore here the advantages and disadvantages of Proxy Certificate that consider the starting points for our research. We also present our suggested modification to provide improvements for delegation technologies and develop the specifications for new technology beyond current limitations. Our modification is based on the consolidation a centralized strict hierarchical and stand-alone structures through banding x.509 standard and proxy certificate together.

Keywords: Digital certification systems, X.509 standard, Proxy Certificates, authentication (PCA), Dynamic delegation, Identity verification, Network security, e-security.

Link to Read Full Paper