Distributed credential chain discovery in trust management: extended abstract
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Delegation logic: A logic-based approach to distributed authorization
ACM Transactions on Information and System Security (TISSEC)
Distributed credential chain discovery in trust management
Journal of Computer Security
Analysis of SPKI/SDSI Certificates Using Model Checking
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A Logical Reconstruction of SPKI
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
A State-Transition Model of Trust Management and Access Control
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
A logical reconstruction of SPKI
Journal of Computer Security - Special issue on CSFW14
Beyond proof-of-compliance: security analysis in trust management
Journal of the ACM (JACM)
Specifying distributed trust management in LolliMon
Proceedings of the 2006 workshop on Programming languages and analysis for security
Agents for e-business applications
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
Trust in large-scale computational grids: an SPKI/SDSI extension for representing opinion
Proceedings of the 4th international workshop on Middleware for grid computing
Language based policy analysis in a SPKI Trust Management System
Journal of Computer Security
Efficient trust management policy analysis from rules
Proceedings of the 9th ACM SIGPLAN international conference on Principles and practice of declarative programming
Journal of Computer Security - Special issue on CSFW15
Information and Computation
Authorization in trust management: Features and foundations
ACM Computing Surveys (CSUR)
Bring efficient connotation expressible policies to trust management
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Open Social Networking for Online Collaboration
International Journal of e-Collaboration
Open Social Networking for Online Collaboration
International Journal of e-Collaboration
Supporting Social Networks With Agent-Based Services
International Journal of Virtual Communities and Social Networking
Hi-index | 0.00 |
We analyze the notion of 驴local names驴 in SPKI/SDSI. By interpreting local names as distributed groups, we develop a simple logic program for SPKI/SDSI's linked local-name scheme and prove that it is equivalent to the name-resolution procedure in SDSI 1.1 and the 4-tuple-reduction mechanism in SPKI/SDSI 2.0. This logic program is itself logic for understanding SDSI's linked local-name scheme and has several advantages over previous logics.We then enhance our logic program to handle authorization certificates, threshold subjects, and certificate discovery. This enhanced program serves as both a logical characterization and an implementation of SPKI/SDSI 2.0's certificate reduction and discovery.We discuss the way SPKI/SDSI uses threshold subjects and names for the purpose of authorization and show that, when used in a certain restricted way, local names can be interpreted as distributed roles.