The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000
DOI: 10.1109/secpri.2000.848442
|View full text |Cite
|
Sign up to set email alerts
|

Access control meets public key infrastructure, or: assigning roles to strangers

Abstract: server.We describe our implementation, which can be used as an extension of a web server or as a separate server with interface to applications.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
182
0

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 230 publications
(187 citation statements)
references
References 4 publications
1
182
0
Order By: Relevance
“…Existing trust models can be categorized into two distinct families: Hard Trust Models where trust is established using credentials and trust policies (e.g. [6] and [17]) and Soft Trust Models where trust is built upon pairs experiences, recommendations and reputation (e.g. [11] [25] [14] and [18].…”
Section: Discussion and Concluding Remarksmentioning
confidence: 99%
“…Existing trust models can be categorized into two distinct families: Hard Trust Models where trust is established using credentials and trust policies (e.g. [6] and [17]) and Soft Trust Models where trust is built upon pairs experiences, recommendations and reputation (e.g. [11] [25] [14] and [18].…”
Section: Discussion and Concluding Remarksmentioning
confidence: 99%
“…Since the number of roles is typically much smaller than the number of users, role-based access control systems reduce the number of access control decisions. A thorough description of role-based access control can be found in (Herzberg et al, 2000). In a role-based access control system the authorization process is split into two steps, namely assignment of one or more roles and check whether a member of the assigned role(s) is allowed to perform the requested action.…”
Section: From Uid/psw-based Authentication To Trust Negotiationmentioning
confidence: 99%
“…), KAoS , PeerTrust (Gavriloaie et al, 2004), Ponder (Damianou et al, 2001), Protune (Bonatti et al, 2006; ? ), PSPL (Bonatti and Samarati, ), Rei (Kagal et al, 2003), RT (Li and Mitchell, ), TPL (Herzberg et al, 2000), WSPL (Anderson, 2004) and XACML (Lorch et al, ; ?). The information we will provide about the aforementioned languages is based on the referenced documents.…”
Section: Presentation Of the Considered Policy Languagesmentioning
confidence: 99%
“…We will illustrate this portion of the space by evaluating Delegation Logic (DL) [17], the Role-based Trust-management (RT) framework [16], [18], [19], SD3 [20], and Trust Policy Language (TPL) [21].…”
Section: A Logic-based Approachesmentioning
confidence: 99%