A calculus for access control in distributed systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
Certificate chain discovery in SPKI?SDSI
Journal of Computer Security
Using Authority Certificates to Create Management Structures
Revised Papers from the 9th International Workshop on Security Protocols
LICS '03 Proceedings of the 18th Annual IEEE Symposium on Logic in Computer Science
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
CADE-22 Proceedings of the 22nd International Conference on Automated Deduction
Artificial Intelligence
Reasoning about the transfer of control
Journal of Artificial Intelligence Research
Dynamics in delegation and revocation schemes: a logical approach
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Transitive trust in mobile scenarios
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Delegation of power in normative multiagent systems
DEON'06 Proceedings of the 8th international conference on Deontic Logic and Artificial Normative Systems
Dynamics in delegation and revocation schemes: a logical approach
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Hi-index | 0.00 |
In this paper we first introduce a logic for describing formally a family of delegation and revocation models that are based on the work in Hagström et al., We then extend our logic to accommodate an epistemic interpretation of trust within the framework that we define. What emerges from this work is a rich framework of formally well-defined delegation and revocation schemes that accommodates an important trust component.