2016
DOI: 10.1007/978-3-319-43005-8_4
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Authorization in Vanadium

Abstract: Abstract. In this tutorial, we present an authorization model for distributed systems that operate with limited internet connectivity. Reliable internet access remains a luxury for a majority of the world's population. Even for those who can afford it, a dependence on internet connectivity may lead to sub-optimal user experiences. With a focus on decentralized deployment, we present an authorization model that is suitable for scenarios where devices right next to each other (such as a sensor or a friend's phon… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…A standard solution in the existing literature, used by SPKI/SDSI [34], Vanadium [82], and bw2 [5], is to include a certificate chain with each message. Just as permission to subscribe to a resource is granted via a chain of delegations in §3, permission to publish to a resource is also granted via a chain of delegations.…”
Section: Starting Solution: Signature Chainsmentioning
confidence: 99%
See 1 more Smart Citation
“…A standard solution in the existing literature, used by SPKI/SDSI [34], Vanadium [82], and bw2 [5], is to include a certificate chain with each message. Just as permission to subscribe to a resource is granted via a chain of delegations in §3, permission to publish to a resource is also granted via a chain of delegations.…”
Section: Starting Solution: Signature Chainsmentioning
confidence: 99%
“…Authorization Services. JEDI is complementary to authorization services for IoT, such as bw2 [5], Vanadium [82], WAVE [6], and AoT [73], which focus on expressing authorization policies and enabling principals to prove they are authorized, rather than on encrypting data. Droplet [79] provides encryption for IoT, but does not support delegation beyond one hop and does not provide hierarchical resources.…”
Section: Related Workmentioning
confidence: 99%
“…There are two kinds of distributed authorization systems [37]. The first kind are the credentials-based authorization systems (F. Schneider's terminology), in which the client presents a set of certificates to an authorization system as a proof of policy compliance [1,2,24,3].…”
Section: Related Workmentioning
confidence: 99%