skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 210415 Find in a Library
Title: Certificate Based Access Control (CBAC) Operation and User Guide
Corporate Author: SPAWAR Systems Ctr
United States of America
Date Published: April 2003
Page Count: 22
Sponsoring Agency: National Institute of Justice (NIJ)
Washington, DC 20531
National Institute of Justice/NCJRS
Rockville, MD 20849
NCJRS Photocopy Services
Rockville, MD 20849-6000
SPAWAR Systems Ctr
San Diego, CA
Grant Number: 2001-RD-R-061
Sale Source: National Institute of Justice/NCJRS
Box 6000
Rockville, MD 20849
United States of America

NCJRS Photocopy Services
Box 6000
Rockville, MD 20849-6000
United States of America
Document: PDF
Type: Report (Technical)
Format: Document
Language: English
Country: United States of America
Annotation: This report describes the installation, configuration, and maintenance, as well as operating procedures of the Certificate Based Access Control (CBAC) software system needed to provide security for integrated information systems capable of sharing data across agencies and jurisdictions.
Abstract: Applications that incorporate CBAC allow participating agencies to control their data based on role definitions and individual user attributes found in digital certification. By using policy-defined rule-sets, CBAC enables agencies to transcend the traditional username, login access control paradigm. CBAC permits need-to-know access to sensitive information, allows agencies to define policy-based rule-sets for access control, enables distributed access control for a federation of systems, enhances private networks by enabling varying levels of access, and decreases administrative time for information-sharing. CBAC has the following features: platform independent, configurable for an existing PKI infrastructure or set-up with internally signed certificates, standard interfaces, easy-to-use Web-based administrators page, rule-set templates, and rapid implementation with no impact to end-users. The report's section on CBAC's installation, configuration, and maintenance addresses minimum hardware, software, and functional requirements; installation instructions; configuration; maintenance; monitoring for system errors; shutdown; backup; and parameters and system configuration. The report's section on operating procedures provides instructions on starting CBAC and explains the various features of the CAPR (Certificate Access Preparation and Review Tool) main Web page. 9 figures and appended operator messages
Main Term(s): Computer privacy and security
Index Term(s): Computer aided operations; Computer software; Confidential records access; Data security; Interagency cooperation; NIJ final report; Regional information sharing systems
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.