2005
DOI: 10.1007/11556992_31
|View full text |Cite
|
Sign up to set email alerts
|

Device-Enabled Authorization in the Grey System

Abstract: We describe the design and implementation of Grey, a

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
58
0

Year Published

2006
2006
2018
2018

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 67 publications
(58 citation statements)
references
References 31 publications
0
58
0
Order By: Relevance
“…We implemented our designs as part of the Grey system for universal access control via convergent devices [BGM+05]. This system is currently in use on the Cylab floor of the Collaborative Innovation Center at Carnegie Mellon University, where students, faculty, and staff use smart phones to control access to their offices and log into their computers.…”
Section: Technical Accomplishmentsmentioning
confidence: 99%
“…We implemented our designs as part of the Grey system for universal access control via convergent devices [BGM+05]. This system is currently in use on the Cylab floor of the Collaborative Innovation Center at Carnegie Mellon University, where students, faculty, and staff use smart phones to control access to their offices and log into their computers.…”
Section: Technical Accomplishmentsmentioning
confidence: 99%
“…As is evident from recent research in access control [2,8,11,14,17], modal logic is a powerful framework to study expressiveness, complexity and semantics of access control logics. Although modal logic has proved useful for theoretical study of access control, it is not widely used in practice to enforce authorization policies (some notable exceptions are [5,6,13,21,22]). …”
Section: Introductionmentioning
confidence: 99%
“…Proof-carrying authorization (PCA) [3,5,6,19,15,17] is a modern access control technology, where an access control policy is formalized as a set of logical formulas, and a principal is allowed to perform an operation on a resource only if that principal can produce a logical proof showing that the policy entails that the principal may perform that operation on that resource. While this architecture allows automatic enforcement of complex access control policies, it substantially increases the burden of the user, since each request to perform an operation must be accompanied by one or more proofs.…”
Section: Introductionmentioning
confidence: 99%
“…It has been applied in different settings including authorization for web services [5], the Grey system [6], and a file system [15]. The latter implementation is the basic test bench for PCAL.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation