ThesaHelp: references a-b
Topic: distributed system security
Topic: security by access rights
Group: security
Topic: authentication
Topic: key distribution
| |
Reference
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.,
"The role of trust management in distributed systems security",
Secure Internet Programming: Security issues for mobile and distributed objects, LNCS 1603, 1999, pp. 186-210.
Google
Quotations
186 ;;Quote: access control lists do not work well for distributed systems; need authentication, delegation, extensibility, and customized policies
| 186 ;;Quote: use trust-management systems for direct authorization of security-critical actions; combines policy with credentials
| 186+;;Quote: trust-management systems support delegation and policy specification, refinement, and hierarchies
| 188 ;;Quote: in a distributed system can not separate authentication from authorization; huge sets of people and requests, often from strangers
| 188 ;;Quote: is the key that signed this request authorized to take this action?
| 188+;;Quote: does this set of credentials prove that a request complies with the local security policy?
| 188+;;Quote: a local security policy usually delegates authorization to trusted credential issuers
| 191 ;;Quote: PolicyMaker trust-management--blackboard system of source s_i approves request r_i via an authorization program
| 194 ;;Quote: KeyNote trust-management--depth-first search to satisfy a policy assertion made of conditions and licensees key expressions; no inter-assertion communication
|
Related Topics
ThesaHelp: references a-b (396 items)
Topic: distributed system security (16 items)
Topic: security by access rights (36 items)
Group: security (23 topics, 802 quotes)
Topic: authentication (87 items)
Topic: key distribution (33 items)
|