2005
DOI: 10.21236/ada457095
|View full text |Cite
|
Sign up to set email alerts
|

Device-Enabled Authorization in the Grey System

Abstract: We describe the design and implementation of Grey, a

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
10
0

Year Published

2005
2005
2011
2011

Publication Types

Select...
3
3
3

Relationship

2
7

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 18 publications
1
10
0
Order By: Relevance
“…Several systems have been built using PCA [10,23,40]. Like many security-typed languages, we use dependently typed PCA to check authorization proofs at compile-time through type checking.…”
Section: Related Workmentioning
confidence: 99%
“…Several systems have been built using PCA [10,23,40]. Like many security-typed languages, we use dependently typed PCA to check authorization proofs at compile-time through type checking.…”
Section: Related Workmentioning
confidence: 99%
“…The Edinburgh Logical Framework (LF) has been used in several prominent projects in the domains of proof-carrying code and proof-carrying authentication [3,1]. A central concern in these applications has been minimizing proof size, since the use model requires proofs to be transmitted over a network to convince skeptical parties that certain operations are safe or permitted [11,5].…”
Section: Using Lf For Smtmentioning
confidence: 99%
“…However, the viability of this approach on the Symbian Series 60 platform has been demonstrated in both C++ [17,24] and Java [5]. In addition to the hash of the AIK certificate, the barcode will also encode the Bluetooth address of the kiosk, which allows the phone to bypass the exceedingly slow device discovery protocol [24].…”
Section: Mobile Device Softwarementioning
confidence: 99%