Security in a secure capability-based system
ACM SIGOPS Operating Systems Review
Fundamentals of computer security technology
Fundamentals of computer security technology
The Java Programming Language
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
SESAME V2 public key and authorisation extensions to Kerberos
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
Trust Relationships in Secure Systems-A Distributed Authentication Perspective
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A java beans component architecture for cryptographic protocols
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Establishing identity without certification authorities
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Merging and extending the PGP and PEM trust models-the ICE-TEL trust model
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
In a distributed system, dynamically dividing execution between nodes is essential for service robustness. However, when all of the nodes cannot be equally trusted, and when some users are more honest than others, controlling where code may be executed and by whom resources may be consumed is a nontrivial problem. In this paper we describe a generic authorisation certificate architecture that allows dynamic control of resource consumption and code execution in an untrusted distributed network. That is, the architecture allows the users to specify which network nodes are trusted to execute code on their behalf and the servers to verify the users' authority to consume resources, while still allowing the execution to span dynamically from node to node, creating delegations on the fly as needed. The architecture scales well, fully supports mobile code and execution migration, and allows users to remain anonymous.