1999
DOI: 10.1007/3-540-48749-2_8
|View full text |Cite
|
Sign up to set email alerts
|

The Role of Trust Management in Distributed Systems Security

Abstract: Abstract. Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming under increasing strain from the development and deployment of systems that increase the programmability of the Internet. Moreover, this "increased flexibility through programmability" trend seems to be accelerating with the advent of proposals such as Active Networking and Mobile Agents. The trust-management approach to distributed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
199
0
2

Year Published

2000
2000
2019
2019

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 336 publications
(201 citation statements)
references
References 18 publications
0
199
0
2
Order By: Relevance
“…For the purposes of illustration, only simple examples are presented in this paper. The reader is referred to [3] for a discussion of the expressiveness of KeyNote.…”
Section: Discussionmentioning
confidence: 99%
“…For the purposes of illustration, only simple examples are presented in this paper. The reader is referred to [3] for a discussion of the expressiveness of KeyNote.…”
Section: Discussionmentioning
confidence: 99%
“…The classical AAA architecture and the above mentioned credential/policy-based distributed trust models are not suitable for direct implementation in DTN due to: design principle, operational complexity, scalability issue and unavailability during long/variable delay and frequent disruption [25], [26]. However, the implementation flexibility offered by the AAA standard and the applicability of certain concepts with slight modification to the DTN environment underlines the suitability of AAA architecture concept to DTN.…”
Section: Access Controlmentioning
confidence: 99%
“…For notational convenience, we will write the labeled rewrite rule (L −→ R, T ) as L T −→ R. We will treat certs as labeled rewrite rules: 3 -A name cert (K, A, S, V ) will be written as a labeled rewrite rule K A −→ S, where is the authorization specification such that for all other authorization specifications t, ∩ t = t, and ∪ t = . 4 Sometimes we will write −→ as simply −→, i.e., a rewrite rule of the form L −→ R has an implicit label of . …”
Section: Certificatesmentioning
confidence: 99%
“…In trust-management systems [4,5,25], such as SPKI/SDSI [9], the security policy is given by a set of signed certificates, and a proof of authorization consists of a set of certificate chains. In SPKI/SDSI, the principals are the public keys, i.e., the identity of a principal is established by checking the validity of the corresponding public key.…”
Section: Introductionmentioning
confidence: 99%