Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186)
DOI: 10.1109/secpri.1998.674819
|View full text |Cite
|
Sign up to set email alerts
|

Access control in an open distributed environment

Abstract: We describe a n a r chitecture for secure, independent, interworking services Oasis. Each service i s made responsible for the classi cation of its clients into named roles, using a formal logic to specify precise conditions for entering each role. A client becomes authenticated by presenting credentials to a service that enable the service to prove that the client conforms to its policy for entry to a particular role. During authentication a data structure i s created that embodies the proof.An authenticated … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
0

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 66 publications
(46 citation statements)
references
References 8 publications
0
46
0
Order By: Relevance
“…CODEX does not include an implementation for |= θ nor does it fix a representation for credentials. However, contemporary authorization engines, like SDSI [35], KeyNote [2] or the work of Hayton et al [23], do provide such implementations and could well be incorporated into CODEX. CODEX associates a separate authorization policy with each of the three operations it supports.…”
Section: Codex Integritymentioning
confidence: 99%
“…CODEX does not include an implementation for |= θ nor does it fix a representation for credentials. However, contemporary authorization engines, like SDSI [35], KeyNote [2] or the work of Hayton et al [23], do provide such implementations and could well be incorporated into CODEX. CODEX associates a separate authorization policy with each of the three operations it supports.…”
Section: Codex Integritymentioning
confidence: 99%
“…The credential record reference (CRR) in the RMC allows the issuer and the CR to be located. Details of how the CR might be designed were given in [9]. [10] discussed engineering issues for OASIS implementations in administrative domains that span many individual services.…”
Section: Oasis Engineeringmentioning
confidence: 99%
“…If the community subject to this policy is small enough, then such enforcement can sometimes be carried out by employing a trusted third party (TTP) to function as a kind of reference monitor [1], which mediates all the interactions subject to it. This has been done by several projects [3,12], mostly in the context of distributed enterprise systems. But if the community is large, as is often the case over the internet, then the use of a single reference monitor is inherently unscalable, since it constitute a dangerous single point of failure, and could become a bottleneck if the system is large enough.…”
Section: Introductionmentioning
confidence: 99%