ACM Transactions on Computer Systems (TOCS)
A Certification Scheme for Electronic Commerce
Proceedings of the International Workshop on Security Protocols
Delegation Protocols for Electronic Commerce
ISCC '01 Proceedings of the Sixth IEEE Symposium on Computers and Communications
Reasoning about accountability in protocols for electronic commerce
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Accountability in organisations
International Journal of Information and Computer Security
Client v. server side protocols, interfaces and storage
Proceedings of the 11th international conference on Security Protocols
Hi-index | 0.00 |
We propose a framework for the analysis of delegation protocols. Our framework allows to analyse how accountability is transferred (or kept) by delegator when she transfers some of her rights to the delegate. The ability to trace how accountability is distributed among principals of a system is crucial in many transactions that have a legal value, because accountability is usually a prerequisite to guarantee other well known security properties (e.g., non repudiation). Our approach starts from the notion of "provability" to formalise accountability. Then, we introduce new specifications for the analysis of delegation protocols and the distribution of credentials necessary to exercise delegated rights.