A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Abductive Authorization Credential Gathering
2009
2009 IEEE International Symposium on Policies for Distributed Systems and Networks
A central task in the context of logic-based decentralized authorization languages is that of gathering credentials from credential providers, required by the resource guard's policy to grant a user's access request. This paper presents an abduction-based algorithm that computes a specification of missing credentials without communicating with remote credential providers. The specification is used to gather credentials from credential providers in a single pass, without involving any
doi:10.1109/policy.2009.23
dblp:conf/policy/BeckerMD09
fatcat:nuju3jl47vh47mkcyvnh4rjxpe