Map
Index
Random
Help
th

QuoteRef: howeJ_2000

topics > all references > ThesaHelp: references g-h



Topic:
authentication
Topic:
reliable communication
Group:
security
Topic:
proof-carrying code
Group:
program proving

Reference

Howell, J., "End-to-end authorization", Conference Proceedings OSDI 4th Symposium on Operating Systems Design and Implementation, 2000, pp. 151-164. Google

Quotations
abstract ;;Quote: end-to-end authorization across administrative, network, abstraction, and protocol boundaries; uses SPKI
153 ;;Quote: a proof of authority consists of verifiable statements; logic of authentication; e.g., Bob speaks for Alice regarding the statements in set T
154 ;;Quote: an authentication Proof consists of statements in the authentication logic and basic facts (i.e., delegations by principles); methods implemented locally
154 ;;Quote: proof that document D is the object that client C associates with name N; by transitivity, signed certificates, and hashes


Related Topics up

Topic: authentication (93 items)
Topic: reliable communication (29 items)
Group: security   (23 topics, 874 quotes)
Topic: proof-carrying code (7 items)
Group: program proving   (10 topics, 311 quotes)

Collected barberCB 11/04
Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.