Trust Management and Whether to Delegate

  • Authors:
  • Simon N. Foley

  • Affiliations:
  • -

  • Venue:
  • Revised Papers from the 9th International Workshop on Security Protocols
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

Trust Management systems use security credentials to determine whether action requests are authorized. This paper examines how they might be used in determining whether requests for delegation are safe.