Filters








6,666 Hits in 4.6 sec

Distributed credential chain discovery in trust management

Ninghui Li, William H. Winsborough, John C. Mitchell
<span title="">2001</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 8th ACM conference on Computer and Communications Security - CCS &#39;01</a> </i> &nbsp;
Since trust management is for decentralized control, systems that use trust management typically issue and often store credentials in a distributed manner.  ...  Thus, a central problem in trust management is to determine whether such a chain exists and, if so, to find it. We call this the credential chain discovery problem.  ...  It is also supported by DoD MURI "Semantics Consistency in Information Exchange" as ONR Grant N00014-97-1-0505. We thank the anonymous reviewers for their helpful comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/501983.502005">doi:10.1145/501983.502005</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/LiWM01.html">dblp:conf/ccs/LiWM01</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tu2z34gkmvgnrlj2fifezz7p6i">fatcat:tu2z34gkmvgnrlj2fifezz7p6i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170706053014/https://www.cs.purdue.edu/homes/ninghui/papers/discovery_jcs03.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/11/90/119083c84569322c97364cbb2a47cd622cb5f460.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/501983.502005"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Distributed credential chain discovery in trust management

Ninghui Li, William H. Winsborough, John C. Mitchell
<span title="">2001</span> <i title="ACM Press"> Proceedings of the 8th ACM conference on Computer and Communications Security - CCS &#39;01 </i> &nbsp;
Since trust management is for decentralized control, systems that use trust management typically issue and often store credentials in a distributed manner.  ...  Thus, a central problem in trust management is to determine whether such a chain exists and, if so, to find it. We call this the credential chain discovery problem.  ...  It is also supported by DoD MURI "Semantics Consistency in Information Exchange" as ONR Grant N00014-97-1-0505. We thank the anonymous reviewers for their helpful comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/502001.502005">doi:10.1145/502001.502005</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/w62k736ibbcarkclyzlnuu6via">fatcat:w62k736ibbcarkclyzlnuu6via</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170706053014/https://www.cs.purdue.edu/homes/ninghui/papers/discovery_jcs03.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/11/90/119083c84569322c97364cbb2a47cd622cb5f460.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/502001.502005"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Distributed credential chain discovery in trust management*

Ninghui Li, William H. Winsborough, John C. Mitchell
<span title="2003-01-01">2003</span> <i title="IOS Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/spxf4rshtfhgvoxv3apocfge6m" style="color: black;">Journal of Computer Security</a> </i> &nbsp;
Since trust management is for decentralized control, systems that use trust management typically issue and often store credentials in a distributed manner.  ...  Thus, a central problem in trust management is to determine whether such a chain exists and, if so, to find it. We call this the credential chain discovery problem.  ...  It is also supported by DoD MURI "Semantics Consistency in Information Exchange" as ONR Grant N00014-97-1-0505. We thank the anonymous reviewers for their helpful comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3233/jcs-2003-11102">doi:10.3233/jcs-2003-11102</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kq6vcqxmbvehnczjchfjq5x7aq">fatcat:kq6vcqxmbvehnczjchfjq5x7aq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170706053014/https://www.cs.purdue.edu/homes/ninghui/papers/discovery_jcs03.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/11/90/119083c84569322c97364cbb2a47cd622cb5f460.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3233/jcs-2003-11102"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper) [chapter]

Ziqing Mao, Ninghui Li, William H. Winsborough
<span title="">2006</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We present a distributed credential chain discovery algorithm for RT C 1 , a language in the RT family that has parameterized roles and constraints.  ...  Trust management (TM) is an approach to access control in decentralized distributed systems with access control decisions based on statements made by multiple principals.  ...  Thus, a central problem in trust management is to determine whether such a chain exists and, if so, to find it. We call this the credential chain discovery problem.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11935308_12">doi:10.1007/11935308_12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/n3b7h6w3m5bqrf7naly6itfjty">fatcat:n3b7h6w3m5bqrf7naly6itfjty</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20100713101420/http://www.cs.purdue.edu/homes/ninghui/papers/rteval_icics06.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bd/a8/bda83f94e3d2ae556b244a5fe1a1f35924daa884.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11935308_12"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Specifying distributed trust management in LolliMon

Jeff Polakow, Christian Skalka
<span title="">2006</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jpubwsjaozha5itdes6pzyz2fm" style="color: black;">Proceedings of the 2006 workshop on Programming languages and analysis for security - PLAS &#39;06</a> </i> &nbsp;
We specify certificate chain discovery in full RT for authorization in a distributed environment where certificates may be stored nonlocally and selective retrieval is necessary.  ...  The uniform LolliMon specification of authorization and certificate chain discovery eases formal reasoning about the system, and scales to a rich collection of trust management features.  ...  Introduction Distributed trust management supports resource protection in modern distributed computing environments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1134744.1134753">doi:10.1145/1134744.1134753</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/pldi/PolakowS06.html">dblp:conf/pldi/PolakowS06</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ey6ktpqki5a3tonb5zyff7xt7a">fatcat:ey6ktpqki5a3tonb5zyff7xt7a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20100710031827/http://www.cs.uvm.edu/~skalka/skalka-pubs/polakow-skalka-plas06.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/da/32/da329f9bbfe6613a509ac7892dcf83d085fa4b2d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1134744.1134753"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Heuristic Discovery of Role-Based Trust Chains in Peer-to-Peer Networks

Ke Chen, Kai Hwang, Gang Chen
<span title="">2009</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ll6bfs5o6bahfinh3u5z2cnyoy" style="color: black;">IEEE Transactions on Parallel and Distributed Systems</a> </i> &nbsp;
Credential chains are needed in trusted peer-to-peer (P2P) applications, where trust delegation must be established between each pair of peers at specific role level.  ...  New heuristic chaining algorithms are developed for backward, forward, and bi-directional discovery of trust chains.  ...  Role-based credentials are specified for P2P trust management in Section 3. Credential networks are constructed with trust graphs and credential chains in Section 4.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tpds.2008.60">doi:10.1109/tpds.2008.60</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2byn5xtyd5h2bon6ssiedu5kry">fatcat:2byn5xtyd5h2bon6ssiedu5kry</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170812011624/http://gridsec.usc.edu/files/TPDS-2007-08-0299.R2-FinalMs-April6-2008.pdf?origin=publication_detail" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6b/fb/6bfbc8a72f70f3c8dbe8dded734e667b275b51b1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tpds.2008.60"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Practical Decentralized Attribute-Based Delegation Using Secure Name Systems

Martin Schanzenbach, Christian Banse, Julian Schutte
<span title="">2018</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yaqmt4o5gzav5ivi6pnbkjqdui" style="color: black;">2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)</a> </i> &nbsp;
The problem with centralizing trust has become evident in recent discoveries of mass surveillance and censorship programs as well as information leakage through hacking incidents.  ...  One approach to decentralizing trust is distributed, attribute-based access control via attribute-based delegation (ABD).  ...  ACKNOWLEDGMENT This work has been partially funded in the project PAR-ADISE by the German Federal Ministry of Education and Research under the reference 16KIS0422.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/trustcom/bigdatase.2018.00046">doi:10.1109/trustcom/bigdatase.2018.00046</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/trustcom/SchanzenbachBS18.html">dblp:conf/trustcom/SchanzenbachBS18</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yobcsvesmvgf7kilzhkqpcaugq">fatcat:yobcsvesmvgf7kilzhkqpcaugq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200830044710/https://arxiv.org/pdf/1805.06398v1.pdf" title="fulltext PDF download [not primary version]" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <span style="color: #f43e3e;">&#10033;</span> <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0e/6d/0e6d45eb4418d02ee91f45d68e056772bcd8a4a3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/trustcom/bigdatase.2018.00046"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Role Based Trust Model for Peer to Peer Systems Using Credential Trees

Chithra Selvaraj, Sheila Anand
<span title="">2011</span> <i title="IACSIT Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/473y5rd3tfgnvnlxddqa5aqeoa" style="color: black;">Journal of clean energy technologies</a> </i> &nbsp;
RT is a Trust Management framework for P2P networks where access control decisions are based on policy statements, called credentials, made by different principals and stored in a distributed manner.  ...  This paper explains the approach of building credential trees for credential chain construction.  ...  Distributed Chain Discovery algorithm does not assume that the credentials are stored in one place.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7763/ijcte.2011.v3.310">doi:10.7763/ijcte.2011.v3.310</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/67ozzpwfqzfjxiiz4nt5cfziii">fatcat:67ozzpwfqzfjxiiz4nt5cfziii</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180720210336/http://www.ijcte.org/papers/310-G450.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/aa/26/aa26a388dcb3966fdaf84484bfbab385efd50c81.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7763/ijcte.2011.v3.310"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Risk management for distributed authorization

Christian Skalka, X. Sean Wang, Peter Chapin
<span title="2007-06-22">2007</span> <i title="IOS Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/spxf4rshtfhgvoxv3apocfge6m" style="color: black;">Journal of Computer Security</a> </i> &nbsp;
In this paper, we introduce a trust management logic based on the system RT that incorporates formal risk assessment.  ...  We also develop an algorithm for automatic authorization in a distributed environment, that is directed by risk considerations. A variety of practical applications are discussed.  ...  In distributed chain discovery, some credentials may be retrieved over the network, in the form of certificates.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3233/jcs-2007-15402">doi:10.3233/jcs-2007-15402</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4ffrrvprtzgt3f5jyqnpb6wx7a">fatcat:4ffrrvprtzgt3f5jyqnpb6wx7a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20070824041409/http://www.cs.uvm.edu/~xywang/publications/skalka-wang-chapin-jcs06submitted.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f0/f3/f0f3ecae5f2ce2624e09be4d74a8766648d9cc6f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3233/jcs-2007-15402"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Dynamic trust negotiation for flexible e-health collaborations

Oluwafemi Ajayi, Richard Sinnott, Anthony Stell
<span title="">2008</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/67n66h5xyfeinldxvfr44upijy" style="color: black;">Proceedings of the 15th ACM Mardi Gras conference on From lightweight mash-ups to lambda grids: Understanding the spectrum of distributed computing requirements, applications, tools, infrastructures, interoperability, and the incremental adoption of key capabilities - MG &#39;08</a> </i> &nbsp;
We show how trust pathways can be established and how remote security credentials could be folded to local security credentials through trust contracts.  ...  In this paper, dynamic trust negotiation is presented as a possible optimal approach that provides support for decentralised access control.  ...  While [16] proposes a trust chain based negotiation strategy (TRANS), which dynamically constructs trust relationships using a trust proxy that can cache common credentials or partial trust chain information  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1341811.1341821">doi:10.1145/1341811.1341821</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/mg/AjayiSS08.html">dblp:conf/mg/AjayiSS08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dzy2hkmhl5eetav4ghnv75i7he">fatcat:dzy2hkmhl5eetav4ghnv75i7he</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20110401124459/http://www.nesc.ac.uk/papers/staff/ajayi-TrustCollaborations-29.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2b/b8/2bb81ec5940fbaad0cabce1b54a9de2e622b6043.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1341811.1341821"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Negotiating trust in the Web

M. Winslett, T. Yu, K.E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, L. Yu
<span title="">2002</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2h6c7f443bcifjjexhfn5p65om" style="color: black;">IEEE Internet Computing</a> </i> &nbsp;
To enable interactions across security domain boundaries, the TrustBuilder trust negotiation system establishes trust between strangers by gradually disclosing credentials.  ...  In some cases, Credential Chain Discovery We can combine credentials to form chains, in which the subject of one credential is the issuer of the next.  ...  The IBM Trust Establishment system's collector searches for credentials in a bottom-up fashion. 1 The Query Certificate Manager (QCM) system and Secure Dynamically Distributed Datalog (SD3) support distributed  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mic.2002.1067734">doi:10.1109/mic.2002.1067734</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/oguifu6dsjhojmeb4rjfml6vs4">fatcat:oguifu6dsjhojmeb4rjfml6vs4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20030501192459/http://hugo.csie.ntu.edu.tw:80/~yjhsu/courses/u2010/papers/IEEE/01067734.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/82/0c/820cfe56310f4146b8c1119b176b5ccce4808224.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mic.2002.1067734"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

SAFE: A Declarative Trust Management System with Linked Credentials [article]

Vamsi Thummala, Jeff Chase
<span title="2015-10-16">2015</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
A key barrier to practical use of logical trust systems is the problem of managing proof contexts: identifying, validating, and assembling the credentials and policies that are relevant to each trust decision  ...  SAFE fetches and validates credential sets on demand and caches them in the authorizer.  ...  We observe some key obstacles in harnessing the power of trust logics in practical distributed systems: 1. Credential discovery.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1510.04629v2">arXiv:1510.04629v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5465cxr7jraspjaod63zos6bkm">fatcat:5465cxr7jraspjaod63zos6bkm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200829174000/https://arxiv.org/pdf/1510.04629v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b4/22/b4224e851d4df527a9f8219c8122bbe4fe9b3811.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1510.04629v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Authorization in trust management

Peter C. Chapin, Christian Skalka, X. Sean Wang
<span title="2008-08-01">2008</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/eiea26iqqjcatatlgxdpzt637y" style="color: black;">ACM Computing Surveys</a> </i> &nbsp;
Trust management systems are frameworks for authorization in modern distributed systems, allowing remotely accessible resources to be protected by providers.  ...  In this paper we survey modern stateof-the-art in trust management authorization, focusing on features of policy and rights languages that provide the necessary expressiveness for modern practice.  ...  In addition Li et al. describe a distributed credential chain discovery algorithm that finds a path in G C given initially incomplete credentials ].  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1380584.1380587">doi:10.1145/1380584.1380587</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4ablaejrwvccrpcarkf4cfrbiq">fatcat:4ablaejrwvccrpcarkf4cfrbiq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809090204/http://www.cs.uvm.edu/~xwang4/publications/chapin-skalka-wang-acmcs07.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f9/1c/f91ca5556b578e3b4a958e677010171a2de25c7e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1380584.1380587"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Nonmonotonic Trust Management for P2P Applications [article]

M. Czenko, H. Tran, J. Doumen, S. Etalle, P. Hartel, J. den Hartog
<span title="2005-10-21">2005</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
This means that they cannot be expressed in current, monotonic trust management languages such as the family of Role Based Trust Management languages (RT).  ...  The semantics of RT- is discussed and presented in terms of the well-founded semantics for Logic Programs. Finally we discuss how chain discovery can be accomplished for RT-.  ...  Trust management credentials are by definition distributed among different principals.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/cs/0510061v1">arXiv:cs/0510061v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zufi2pekwne5pdzpbgyg2pi7f4">fatcat:zufi2pekwne5pdzpbgyg2pi7f4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171008213255/https://core.ac.uk/download/pdf/2421293.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a5/43/a5433f8711b100edd46e2e03ef720e3b0fe08bb0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/cs/0510061v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Nonmonotonic Trust Management for P2P Applications

Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etalle, Pieter Hartel, Jerry den Hartog
<span title="">2006</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/uy5mv2ncw5eahkdx47hkrglxmm" style="color: black;">Electronical Notes in Theoretical Computer Science</a> </i> &nbsp;
This means that they cannot be expressed in current, monotonic trust management languages such as the family of Role Based Trust Management languages (RT).  ...  The semantics of RT is discussed and presented in terms of the well-founded semantics for Logic Programs. Finally we discuss how chain discovery can be accomplished for RT .  ...  Conclusions and future work We present the language RT , which adds a construct for 'negation-in-context' to the RT 0 trust management system.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.entcs.2005.09.037">doi:10.1016/j.entcs.2005.09.037</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3jvsxglo3jcpjgaq4vnhxsicp4">fatcat:3jvsxglo3jcpjgaq4vnhxsicp4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170924020645/http://publisher-connector.core.ac.uk/resourcesync/data/elsevier/pdf/0bb/aHR0cDovL2FwaS5lbHNldmllci5jb20vY29udGVudC9hcnRpY2xlL3BpaS9zMTU3MTA2NjEwNjAwMjk2OQ%3D%3D.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ea/f9/eaf9e926171d8b6c6c96c83d83b2110b1f4db539.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.entcs.2005.09.037"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 6,666 results