Role-Based Access Control Models
Computer
Regulating service access and information release on the Web
Proceedings of the 7th ACM conference on Computer and communications security
Policy-directed certificate retrieval
Software—Practice & Experience
Interoperable strategies in automated trust negotiation
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Certificate chain discovery in SPKI?SDSI
Journal of Computer Security
Compliance Checking in the PolicyMaker Trust Management System
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Fast Access Control Decisions from Delegation Certificate Databases
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
CSFW '00 Proceedings of the 13th IEEE workshop on Computer Security Foundations
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A Practically Implementable and Tractable Delegation Logic
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
SD3: A Trust Management System with Certified Evaluation
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Design and implementation of the idemix anonymous credential system
Proceedings of the 9th ACM conference on Computer and communications security
ACM Transactions on Information and System Security (TISSEC)
Delegation logic: A logic-based approach to distributed authorization
ACM Transactions on Information and System Security (TISSEC)
IEEE Internet Computing
Protecting sensitive attributes in automated trust negotiation
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
DATALOG with Constraints: A Foundation for Trust Management Languages
PADL '03 Proceedings of the 5th International Symposium on Practical Aspects of Declarative Languages
ConChord: Cooperative SDSI Certificate Storage and Name Resolution
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Distributed credential chain discovery in trust management
Journal of Computer Security
A Unified Scheme for Resource Protection in Automated Trust Negotiation
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Requirements for Policy Languages for Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Towards Practical Automated Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
An approach to certificate path discovery in mobile Ad Hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
User centricity: a taxonomy and open issues
Proceedings of the second ACM workshop on Digital identity management
Language based policy analysis in a SPKI Trust Management System
Journal of Computer Security
ROST: Remote and hot service deployment with trustworthiness in CROWN Grid
Future Generation Computer Systems
Efficient trust management policy analysis from rules
Proceedings of the 9th ACM SIGPLAN international conference on Principles and practice of declarative programming
Role-based access control for boxed ambients
Theoretical Computer Science
User centricity: A taxonomy and open issues
Journal of Computer Security - The Second ACM Workshop on Digital Identity Management - DIM 2006
RBAC administration in distributed systems
Proceedings of the 13th ACM symposium on Access control models and technologies
Towards Role Based Trust Management without Distributed Searching of Credentials
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
An Implementation of Role-Base Trust Management Extended with Weights on Mobile Devices
Electronic Notes in Theoretical Computer Science (ENTCS)
Types for security in a mobile world
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
Towards flexible credential negotiation protocols
Proceedings of the 11th international conference on Security Protocols
Semantic web policies – a discussion of requirements and research issues
ESWC'06 Proceedings of the 3rd European conference on The Semantic Web: research and applications
Early experience of remote and hot service deployment with trustworthiness in CROWN grid
APPT'05 Proceedings of the 6th international conference on Advanced Parallel Processing Technologies
Distributed authorization framework for mobile agents
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
ATVA'06 Proceedings of the 4th international conference on Automated Technology for Verification and Analysis
Rule-based policy representation and reasoning for the semantic web
RW'07 Proceedings of the Third international summer school conference on Reasoning Web
A social network-based trust-aware propagation model for P2P systems
Knowledge-Based Systems
Attacks on Confidentiality of Communications Between Stranger Organizations
International Journal of Knowledge-Based Organizations
Hi-index | 0.00 |
We give goal-oriented algorithms for discovering credential chains in RTo, a role-based trust-management language introduced in this paper. The algorithms search credential graphs, a representation of RTo credentials. We prove that evaluation based on reachability in credential graphs is sound and complete with respect to the set-theoretic semantics of RTo . RTo is more expressive than SDSI 2.0, so our algorithms can perform chain discovery in SDSI 2.0, for which existing algorithms in the literature either are not goal-oriented or require using specialized logic-programming inferencing engines. Being goal-oriented enables our algorithms to be used when credential storage is distributed. We introduce a type system for credential storage that guarantees well-typed, distributed credential chains can be discovered.