Proceedings of the 2004 Workshop on Secure Web Service - SWS '04 2004
DOI: 10.1145/1111348.1111354
|View full text |Cite
|
Sign up to set email alerts
|

Trust but verify

Abstract: Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses signicant challenges to security. In particular, an end user (be it human or machine) may access a web service directly, or through a number of intermediaries, while these intermediaries may be formed on the y for a particular task. Traditional access control for distributed systems is not exible and ecient enough in such an environment. I… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…Three types of digital certificates are used: identity certificates for authentication, attribute certificates for authorisation and access-rule certificates for propagation of access control. The authors use a subset of the full Skalka and Wang (2004) logic, which they will describe in Section 3. In the authors' implementation approach, they propose the use of digital certificates, SSL and secures electronic transactions (SET) to be used in conjunction with access control intermediates.…”
Section: Access Control Logicmentioning
confidence: 99%
See 4 more Smart Citations
“…Three types of digital certificates are used: identity certificates for authentication, attribute certificates for authorisation and access-rule certificates for propagation of access control. The authors use a subset of the full Skalka and Wang (2004) logic, which they will describe in Section 3. In the authors' implementation approach, they propose the use of digital certificates, SSL and secures electronic transactions (SET) to be used in conjunction with access control intermediates.…”
Section: Access Control Logicmentioning
confidence: 99%
“…Although ABLP logic is undecidable in general, various presentations have described non-trivial, decidable access control mechanisms (Wallach et al, 2000;Skalka and Wang, 2004). s s s s ′ ′⊃ Naturally, it is desirable for authorisation judgments to be decidable.…”
Section: Authorisation Contexts and Decisionsmentioning
confidence: 99%
See 3 more Smart Citations