Role-Based Access Control Models
Computer
Certificate chain discovery in SPKI?SDSI
Journal of Computer Security
Introduction to Algorithms
Distributed credential chain discovery in trust management
Journal of Computer Security
Certificate-based authorization policy in a PKI environment
ACM Transactions on Information and System Security (TISSEC)
Engineering Trust Management into Software Models
MISE '07 Proceedings of the International Workshop on Modeling in Software Engineering
Authorization in trust management: Features and foundations
ACM Computing Surveys (CSUR)
An introduction to the role based trust management framework RT
Foundations of security analysis and design IV
Credential chain discovery in RTTtrust management language
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Decentralized trust management
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Hi-index | 0.01 |
Trust management is a concept of automatic verification of access rights against distributed security policies. A policy is described by a set of credentials that define membership of roles and delegation of authority over a resource between the members of roles. Making an access control decision is equivalent to resolving a credential chain between the requester and the role, which members are authorized to use a resource. A credential is an electronic document, formulated using a trust management language. This way, trust management languages are a tool for describing credentials and specifying access control policies in a flexible and modifiable way. This paper discusses the expressive power of trust management languages, describes a new extension to Role-based Trust Managements language RTT, and evaluates the complexity of algorithm that is used for answering security queries.