Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
Certificate chain discovery in SPKI?SDSI
Journal of Computer Security
Compliance Checking in the PolicyMaker Trust Management System
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Distributed credential chain discovery in trust management
Journal of Computer Security
On SDSI's Linked Local Name Spaces
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
A Framework for Establishing Decentralized Secure Coalitions
CSFW '06 Proceedings of the 19th IEEE workshop on Computer Security Foundations
Service-Oriented Policy Management for Web-Application Frameworks
IEEE Internet Computing
Authorisation subterfuge by delegation in decentralised networks
Proceedings of the 13th international conference on Security protocols
A logic for analysing subterfuge in delegation chains
FAST'05 Proceedings of the Third international conference on Formal Aspects in Security and Trust
Decentralized semantic threat graphs
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Hi-index | 0.00 |
Trust Management systems are typically explicit in their assumption that principals are uniquely identifiable. However, the literature has not been as prescriptive concerning the uniqueness of the permissions delegated by principals. Delegation subterfuge may arise when there is ambiguity concerning the uniqueness and interpretation of a permission. As a consequence, delegation chains that are used by principals to prove authorization may not actually reflect the original intention of all of the participants in the chain. This paper describes an extension to SPKI/SDSI that uses the notion of linked local permissions to eliminate ambiguity concerning the interpretation of a permission and thereby avoid subterfuge attacks.