Map
Index
Random
Help
th

QuoteRef: blazM_1999

topics > all references > ThesaHelp: references a-b



ThesaHelp:
references a-b
Topic:
distributed system security
Topic:
security by access rights
Group:
security
Topic:
authentication
Topic:
key distribution

Reference

Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D., "The role of trust management in distributed systems security", Secure Internet Programming: Security issues for mobile and distributed objects, LNCS 1603, 1999, pp. 186-210. Google

Quotations
186 ;;Quote: access control lists do not work well for distributed systems; need authentication, delegation, extensibility, and customized policies
186 ;;Quote: use trust-management systems for direct authorization of security-critical actions; combines policy with credentials
186+;;Quote: trust-management systems support delegation and policy specification, refinement, and hierarchies
188 ;;Quote: in a distributed system can not separate authentication from authorization; huge sets of people and requests, often from strangers
188 ;;Quote: is the key that signed this request authorized to take this action?
188+;;Quote: does this set of credentials prove that a request complies with the local security policy?
188+;;Quote: a local security policy usually delegates authorization to trusted credential issuers
191 ;;Quote: PolicyMaker trust-management--blackboard system of source s_i approves request r_i via an authorization program
194 ;;Quote: KeyNote trust-management--depth-first search to satisfy a policy assertion made of conditions and licensees key expressions; no inter-assertion communication

Related Topics up

ThesaHelp: references a-b (396 items)
Topic: distributed system security (16 items)
Topic: security by access rights (36 items)
Group: security   (23 topics, 802 quotes)
Topic: authentication (87 items)
Topic: key distribution (33 items)

Collected barberCB 7/00
Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.