Filters








28 Hits in 1.1 sec

Guest Editor's Preface

Dimitris Gritzalis, Dimitris Gritzalis
2011 Journal of Computer Security  
In "A logic for SDSI's linked local name spaces", Halpern and van der Meyden present a logic for local names in Rivest and Lampson's Simple Distributed System Infrastructure (SDSI).  ...  SDSI's name spaces have been considered logically before, notably by Abadi; however, the logic and semantics in this paper more directly respects SDSI's name resolution algorithm.  ... 
doi:10.3233/jcs-2011-0441 fatcat:ie5byugxdfgrdirr3bdwf6kuym

Guest editor's preface

Paul F. Syverson
2001 Journal of Computer Security  
In "A logic for SDSI's linked local name spaces", Halpern and van der Meyden present a logic for local names in Rivest and Lampson's Simple Distributed System Infrastructure (SDSI).  ...  SDSI's name spaces have been considered logically before, notably by Abadi; however, the logic and semantics in this paper more directly respects SDSI's name resolution algorithm.  ... 
doi:10.3233/jcs-2001-91-201 fatcat:okyasyioe5hjrlrxx6nfngexcu

A Logic for SDSI's Linked Local Name Spaces [article]

Joseph Y. Halpern, Ron van der Meyden
2000 arXiv   pre-print
Abadi's logic does not correspond precisely to SDSI, however; it draws conclusions about local names that do not follow from SDSI's name resolution algorithm.  ...  This paper presents the Logic of Local Name Containment, which does not suffer from these deficiencies. It has a clear semantics and provides a tight characterization of SDSI name resolution.  ...  Acknowledgments Work on this paper was done while the second author was with the School of Computing Sciences, University of Technology, Sydney.  ... 
arXiv:cs/0001026v1 fatcat:hk7cqwfe7bhidopijsbu6rwlzm

Reducing the Dependence of SPKI/SDSI on PKI [chapter]

Hao Wang, Somesh Jha, Thomas Reps, Stefan Schwoon, Stuart Stubblebine
2006 Lecture Notes in Computer Science  
One reason for this is that both systems require a public-key infrastructure (PKI) for authentication, and PKI has proven difficult to deploy, because each user is required to manage his/her own private  ...  Local names are important in SPKI/SDSI because they create a decentralized name space. The local name space of K is the set of local names of the form K A.  ...  Certificates SPKI/SDSI has two types of certificates, or "certs": Name Certificates (or name certs): A name cert provides a definition of a local name in the issuer's local name space.  ... 
doi:10.1007/11863908_11 fatcat:ixsek6rlvnah5ecfdydj6ncktq

Avoiding Delegation Subterfuge Using Linked Local Permission Names [chapter]

Simon N. Foley, Samane Abdi
2012 Lecture Notes in Computer Science  
This paper describes an extension to SPKI/SDSI that uses the notion of linked local permissions to eliminate ambiguity concerning the interpretation of a permission and thereby avoid subterfuge attacks  ...  SDSI's rationale of using local names as reliable references to principals is extended in this section to include local names for permissions that are linked to principal namespaces.  ...  Local names may be linked whereby an (extended) local name (P N ) identifies a principal named as N in the namespace of a principal identified by local name P .  ... 
doi:10.1007/978-3-642-29420-4_7 fatcat:qkhtnlxwgbfm3f6r2hzvvyekki

Understanding SPKI/SDSI using first-order logic

Ninghui Li, John C. Mitchell
2005 International Journal of Information Security  
The constraint feature of RT C 1 , based on Constraint Datalog, provides an alternative mechanism that is expressively similar to SPKI/SDSI tags, semantically natural, and algorithmically tractable.  ...  Principal K can define K A to include a principal, a local name, or a linked local name (also called an extended name).  ...  The notion of vocabularies is complementary to the notion of localized name spaces for roles. Each addresses a distinct name space issue.  ... 
doi:10.1007/s10207-005-0073-0 fatcat:nk4zylxd4jcujnctmkvvdd3ynq

An Autonomic Trust Management Framework for Secure Dynamic Coalition Cooperation

Samane Abdi
2013 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing  
A coalition provides a virtual space for collaborators to share their resources and interact with each other.  ...  This paper presents a secure coalition framework based on a logic-based language, Subterfuge Safe Authorization Language (SSAL).  ...  Local names are inherited from Simple Distributed Security Infrastructure (SDSI) mechanism [6] and are formed by linking principals to name identifiers.  ... 
doi:10.1109/uic-atc.2013.36 dblp:conf/uic/Abdi13 fatcat:ulsldx4hwnbptp4pj4jwgpqkce

Reconstructing trust management

Ajay Chander, Drew Dean, John C. Mitchell, Joshua Guttman
2004 Journal of Computer Security  
We prove soundness and completeness of the authorization system without names and prove that naming is orthogonal to authorization in a precise sense.  ...  We present a trust management kernel that clearly separates authorization and structured distributed naming.  ...  The label on an E name edge tracks a portion of a linked local name that is yet to be traversed from the destination vertex in order to resolve a local name definition in the name space of the source vertex  ... 
doi:10.3233/jcs-2004-12106 fatcat:lg4sz544hbgi7ec3rwjgx2yxui

Efficient trust management policy analysis from rules

Katia Hristova, K. Tuncay Tekle, Yanhong A. Liu
2007 Proceedings of the 9th ACM SIGPLAN international conference on Principles and practice of declarative programming - PPDP '07  
A name certificate defines a local name in its issuer's local name space.  ...  A name certificate is the 4-tuple (K, I, S, V ), where K is the public key of the issuer of the certificate; I is an identifier from the local name space of the issuer; S is the name or key that the local  ... 
doi:10.1145/1273920.1273950 dblp:conf/ppdp/HristovaTL07 fatcat:kpswe4qomratfibxt3kxfi6f7e

Local names in SPKI/SDSI

N. Li
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13  
By interpreting local names as distributed groups, we develop a simple logic program for SPKI/SDSI's linked localname scheme and prove that it is equivalent to the nameresolution procedure in SDSI 1.1  ...  This logic program is itself a logic for understanding SDSI's linked local-name scheme and has several advantages over previous logics, e.g., those of Abadi [1] and Halpern and van der Meyden [13] .  ...  Acknowledgement Joan Feigenbaum and Martin Abadi made many useful comments on early drafts of this paper. Email discussions with Carl Ellison were helpful.  ... 
doi:10.1109/csfw.2000.856921 dblp:conf/csfw/Li00 fatcat:km4idt7gozea5cvilung32omlm

Certificate Linking and Caching for Logical Trust [article]

Qiang Cao, Vamsi Thummala, Jeffrey S. Chase, Yuanjun Yao, Bing Xie
2017 arXiv   pre-print
Linking allows granular control over dynamic logic content based on dependency relationships, enabling a logic server to make secure inferences at high throughput.  ...  Participants make trust decisions by issuing local queries over logic content exchanged in certificates.  ...  Note that SAFE's linking at the set/certificate level is distinct from SDSI's "linked local names": these exist at the logic level and are subsumed by Datalog [26] , which SAFE also uses.  ... 
arXiv:1701.06562v1 fatcat:tb6gpk6nfnamha2qsl4ncohyv4

Health information identification and de-identification toolkit

I S Kohane, H Dong, P Szolovits
1998 Proceedings. AMIA Symposium  
Because of SDSI's ability to export name spaces, using the Internet, HIIDIT's key distribution task is considerably simplified.  ...  Each principal can create and share with others local name spaces with which she can refer to other principals.  ... 
pmid:9929241 pmcid:PMC2232117 fatcat:p5xkqryglrd3hderlscp56edfy

Authorization in trust management

Peter C. Chapin, Christian Skalka, X. Sean Wang
2008 ACM Computing Surveys  
In this paper we survey modern stateof-the-art in trust management authorization, focusing on features of policy and rights languages that provide the necessary expressiveness for modern practice.  ...  By allowing providers to specify policy, and access requesters to possess certain access rights, trust management automates the process of determining whether access should be allowed on the basis of policy  ...  In contrast to this approach, Abadi developed a logic of SDSI's linked local names [Abadi 1998 ].  ... 
doi:10.1145/1380584.1380587 fatcat:4ablaejrwvccrpcarkf4cfrbiq

Distributed credential chain discovery in trust management*

Ninghui Li, William H. Winsborough, John C. Mitchell
2003 Journal of Computer Security  
This is different from the certificate path discovery problem for X.509 certificates [7], because credentials in TM systems generally have more complex meanings than simply binding names to public keys  ...  These systems are based on the notion of delegation, whereby one entity gives some of its authority to other entities.  ...  The notion of vocabularies is complimentary to the notion of localized name spaces for roles. Each addresses a distinct role name-space issue.  ... 
doi:10.3233/jcs-2003-11102 fatcat:kq6vcqxmbvehnczjchfjq5x7aq

Distributed credential chain discovery in trust management

Ninghui Li, William H. Winsborough, John C. Mitchell
2001 Proceedings of the 8th ACM conference on Computer and Communications Security - CCS '01  
This is different from the certificate path discovery problem for X.509 certificates [7], because credentials in TM systems generally have more complex meanings than simply binding names to public keys  ...  These systems are based on the notion of delegation, whereby one entity gives some of its authority to other entities.  ...  The notion of vocabularies is complimentary to the notion of localized name spaces for roles. Each addresses a distinct role name-space issue.  ... 
doi:10.1145/501983.502005 dblp:conf/ccs/LiWM01 fatcat:tu2z34gkmvgnrlj2fifezz7p6i
« Previous Showing results 1 — 15 out of 28 results