Topic: authentication
Topic: reliable communication
Group: security
Topic: proof-carrying code
Group: program proving
| |
Reference
Howell, J.,
"End-to-end authorization",
Conference Proceedings OSDI 4th Symposium on Operating Systems Design and Implementation, 2000, pp. 151-164.
Google
Quotations
abstract ;;Quote: end-to-end authorization across administrative, network, abstraction, and protocol boundaries; uses SPKI
| 153 ;;Quote: a proof of authority consists of verifiable statements; logic of authentication; e.g., Bob speaks for Alice regarding the statements in set T
| 154 ;;Quote: an authentication Proof consists of statements in the authentication logic and basic facts (i.e., delegations by principles); methods implemented locally
| 154 ;;Quote: proof that document D is the object that client C associates with name N; by transitivity, signed certificates, and hashes
|
Related Topics
Topic: authentication (93 items)
Topic: reliable communication (29 items)
Group: security (23 topics, 874 quotes)
Topic: proof-carrying code (7 items)
Group: program proving (10 topics, 311 quotes)
|