Abductive Authorization Credential Gathering

Moritz Y. Becker, Jason F. Mackay, Blair Dillaway
2009 2009 IEEE International Symposium on Policies for Distributed Systems and Networks  
A central task in the context of logic-based decentralized authorization languages is that of gathering credentials from credential providers, required by the resource guard's policy to grant a user's access request. This paper presents an abduction-based algorithm that computes a specification of missing credentials without communicating with remote credential providers. The specification is used to gather credentials from credential providers in a single pass, without involving any
more » ... on with the resource guard. The credentials gathered thus are pushed to the resource guard at authorization time. This approach decouples authorization from credential gathering, and, in comparison to server-side pull methods, reduces the number of messages sent between participants, and allows for environments in which some credential providers are unknown or unavailable to the resource guard at authorization time.
doi:10.1109/policy.2009.23 dblp:conf/policy/BeckerMD09 fatcat:nuju3jl47vh47mkcyvnh4rjxpe