Logic Programming
DOI: 10.1007/978-3-540-74610-2_26
|View full text |Cite
|
Sign up to set email alerts
|

Core TuLiP Logic Programming for Trust Management

Abstract: DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Publication Types

Select...
3
2
1

Relationship

6
0

Authors

Journals

citations
Cited by 9 publications
(25 citation statements)
references
References 15 publications
0
25
0
Order By: Relevance
“…In CTM [3], [5], [9], [19], [25], [32], access decisions are based on credentials. Credentials are digital certificates attesting that a certain subject has a certain attribute, and are digitally signed by the certificate issuer to ensure their authenticity and integrity.…”
Section: Credential-based Trust Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…In CTM [3], [5], [9], [19], [25], [32], access decisions are based on credentials. Credentials are digital certificates attesting that a certain subject has a certain attribute, and are digitally signed by the certificate issuer to ensure their authenticity and integrity.…”
Section: Credential-based Trust Modelmentioning
confidence: 99%
“…The decision of the PDP is returned to the PEP which enforces it, possibly releasing the requested credential. Notice that, since clauses may refer to credentials issued by other principals, the decision of the PDP can in turn be , [3], [9], [21]. The proposed architecture is flexible enough to implement any of them.…”
Section: Ctm Service Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…Present TM systems do not satisfy all three conditions; RT [13,12] comes very close by satisfying the second and third requirements, but at the cost of a syntax which is too inflexible for our purposes (see our [6] for a discussion on this). Other systems either do not support decentralised storage or do not enjoy a sound and complete decision algorithm (see the Related Work section for the details).…”
Section: Introductionmentioning
confidence: 97%
“…Standard TuLiP is based on the theoretical basis laid in Core TuLiP [6], i.e. on the same concept of credential storage system and on a similar decision algorithm (which in turn is inspired by the architecture of RT [13]).…”
Section: Introductionmentioning
confidence: 99%