2000
DOI: 10.1002/1097-024x(200012)30:15<1609::aid-spe334>3.0.co;2-5
|View full text |Cite
|
Sign up to set email alerts
|

Policy-directed certificate retrieval

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2005
2005
2011
2011

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(8 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…Trust management [Blaze et al 1996[Blaze et al , 1999a[Blaze et al , 1999bRivest and Lampson 1996;Ellison et al 1999;Clarke et al 2001;Gunter and Jim 2000;Jim 2001;Li et al , 2002Li andMitchell 2003a, 2003b;Weeks 2001] is an approach to access control in decentralized distributed systems with access control decisions based on policy statements made by multiple principals. In trust management systems, statements that are maintained in a distributed manner are often digitally signed to ensure their authenticity and integrity; such statements are called credentials or certificates.…”
Section: Introductionmentioning
confidence: 99%
“…Trust management [Blaze et al 1996[Blaze et al , 1999a[Blaze et al , 1999bRivest and Lampson 1996;Ellison et al 1999;Clarke et al 2001;Gunter and Jim 2000;Jim 2001;Li et al , 2002Li andMitchell 2003a, 2003b;Weeks 2001] is an approach to access control in decentralized distributed systems with access control decisions based on policy statements made by multiple principals. In trust management systems, statements that are maintained in a distributed manner are often digitally signed to ensure their authenticity and integrity; such statements are called credentials or certificates.…”
Section: Introductionmentioning
confidence: 99%
“…Also, QCM [17], SD3 [18], and Cassandra [19] provide ways to refer locations where credentials can be found. In the case of RT, issuers or subjects of credentials are assumed to store credentials according to the storage type of credentials.…”
Section: Related Workmentioning
confidence: 99%
“…Rather than merely answering "no" outright in case an authorization goal cannot be reached, the system might identify credentials that are missing and attempt to collect them. This functionality is sometimes called distributed certificate chain discovery or policy directed certificate retrieval [Gunter and Jim 2000b]. Whatever the specifics, it is clear that this functionality makes for a more flexible system in terms of certificate distribution and storage, but presents a significant challenge to system designers.…”
Section: :7mentioning
confidence: 99%
“…Of course, given the potentially enormous number of certificates on the network, it is necessary to define some means of selectively retrieving only certificates that might pertain to a particular authorization decision. This problem is sometimes called distributed certificate chain discovery or policy directed certificate retrieval [Gunter and Jim 2000b]. In both of these approaches the process of obtaining certificates is formally well founded and not left to ad hoc techniques.…”
Section: Threshold and Separation Of Duty Policiesmentioning
confidence: 99%