DOI: 10.3990/1.9789036528542
|View full text |Cite
|
Sign up to set email alerts
|

Tulip - reshaping trust management

Abstract: This thesis would have never become a reality without an enormous help of my two promotors: Sandro Etalle and Pieter Hartel. I am grateful to Sandro Etalle for countless number of things. First of all, I thank Sandro for his commitment to my work. I cannot recall a single moment, when I had the feeling that the work I was doing was not important to him. Sandro's honesty was an important driving force that helped me to retain self-confidence and belief in that I am able to finish this Ph.D. thesis. Everything I… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 18 publications
(3 citation statements)
references
References 71 publications
(208 reference statements)
0
3
0
Order By: Relevance
“…In TuLiP, the first rule is called a credential, the second rule is a user-defined constraint [8]. Assume that there exist the following credentials:…”
Section: Ld Derivations With Groupingmentioning
confidence: 99%
See 2 more Smart Citations
“…In TuLiP, the first rule is called a credential, the second rule is a user-defined constraint [8]. Assume that there exist the following credentials:…”
Section: Ld Derivations With Groupingmentioning
confidence: 99%
“…For instance, if one of the recommends(...) credentials is not found, the query would fail, which means that marcin would not be able to read the document even though he has sufficient permissions. One of the things we try to handle in TuLiP [8,9,10] is where to store the credentials so that they can be found later during the credential discovery. If we assume that mode(read_document) = mode(partner) = mode(senior) = mode(recommends) = (In, Out) and mode(senior_recommends) = (In, Out, Out) then, by the credential storage principles of TuLiP, all the credentials and the user-defined constraint will be stored by their issuers (indicated by the first argument of a credential atom).…”
Section: Ld Derivations With Groupingmentioning
confidence: 99%
See 1 more Smart Citation