Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
A calculus for access control in distributed systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
An authentication logic supporting synchronization, revocation, and recency
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Application-Oriented Security Policies and Their Composition (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
Efficient Certificate Revocation
Efficient Certificate Revocation
Review and Revocation of Access Privileges Distributed Through Capabilities
IEEE Transactions on Software Engineering
On the Negotiation of Access Control Policies
Revised Papers from the 9th International Workshop on Security Protocols
Revocation scheme for PMI based upon the tracing of certificates chains
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Hi-index | 0.00 |
Public-key infrastructures (PKIs) that support both identity certificates and access control (e.g., attribute, delegation) certificates are increasingly common. We argue that these PKIs must a lso support revocation and review policies that are typical of more traditional access control systems; e.g., selective and transitive certificate revocation, and per-object access review. Further, we show that PKIs that eliminate identity certificates, such as the SPKI, resolve only selective revo cation problems and, at the same time, make access review more complex.