Proceedings of the 2005 ACM Workshop on Formal Methods in Security Engineering 2005
DOI: 10.1145/1103576.1103581
|View full text |Cite
|
Sign up to set email alerts
|

Risk assessment in distributed authorization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2007
2007
2016
2016

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…al are intended for developing metric of trust, but we found these principles applicable to our study as well [24]. The formal logic language introduced for measuring risks in trust delegation in the RT framework inspires us to describe our metric using abstract operators [6].…”
Section: Related Workmentioning
confidence: 95%
See 1 more Smart Citation
“…al are intended for developing metric of trust, but we found these principles applicable to our study as well [24]. The formal logic language introduced for measuring risks in trust delegation in the RT framework inspires us to describe our metric using abstract operators [6].…”
Section: Related Workmentioning
confidence: 95%
“…Second, there is no naturally induced order between the execution of the exploit 1 and that of exploit 2, so they can be executed in any order. Intuitively, these two exploits meet at exploit 6 in the sense that we combine these two resistance values in the same formula when we compute R(6) = 1/(1/(r(1) + r(4)) + 1/r(2)) + r (6). At that point, the last composition operator used is ⊕ (that is, the exploit 4 and exploit 2 are .…”
Section: Fig 2 An Example Of Attack Resistance In Real Numbermentioning
confidence: 99%
“…Chapin et al, presented a trust management language, which is able to reason about risk induced by credentials [44]. Although RAR utilizes X.509 certificates for role membership proof, the risk of secure collaboration in RAR's settings is more related to permissions and users' requests but not credentials.…”
Section: Riskmentioning
confidence: 99%
“…In prior work, we developed preliminary foundations for the system RT R [11]. However, the current presentation has a more rigorously developed metatheory and chain discovery algorithm, and a more general theory of authorization thresholds.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, we develop a trust management logic called RT R , introduced in a simpler form in previous work [11], that formally incorporates formal risk assessment. The system is a variant of RT [19], and includes an abstract definition of risk, a means to associate risk with individual assertions, and a semantics that assesses risk of authorization by combining the risk of assertions used in authorization decisions.…”
Section: Introductionmentioning
confidence: 99%