16th IEEE Computer Security Foundations Workshop, 2003. Proceedings.
DOI: 10.1109/csfw.2003.1212714
|View full text |Cite
|
Sign up to set email alerts
|

On generalized authorization problems

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
45
0

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 22 publications
(45 citation statements)
references
References 49 publications
0
45
0
Order By: Relevance
“…Schwoon et al [24] introduced a new algorithm for certificate-chain discovery that translates SPKI/SDSI certificates to rules in a weighted pushdown system (WPDS) [22]. The algorithm presented by Schwoon et al [24] can discover proofs of authorization that consist of multiple certificate chains.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…Schwoon et al [24] introduced a new algorithm for certificate-chain discovery that translates SPKI/SDSI certificates to rules in a weighted pushdown system (WPDS) [22]. The algorithm presented by Schwoon et al [24] can discover proofs of authorization that consist of multiple certificate chains.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, the algorithm presented in [24] addresses such issues as trust, privacy, and recency in the context of authorization in SPKI/SDSI. As in [24], in this paper we translate SPKI/SDSI certificates into rules in a WPDS, where the authorization specifications of the certificates are translated to weights on rules. This translation to a WPDS yields a complete certificate-chain-discovery algorithm and is described in Section 5.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations