Using Authority Certificates to Create Management Structures
Revised Papers from the 9th International Workshop on Security Protocols
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Policy Administration Control and Delegation Using XACML and Delegent
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
Towards the development of privacy-aware systems
Information and Software Technology
Revocation Schemes for Delegation Licences
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Delegating revocations and authorizations in collaborative business environments
Information Systems Frontiers
Hi-index | 0.00 |
We have an existing framework for updating privileges and creating management structures by means of authority certificates. These areused both to create access-level permissions and to delegate authority to other agents. Here we extend the framework to support a richerset of evocation schemes. The discussion of evocation follows an existing classification in the literature based on three separate dimensions:resilience, propagation, and dominance. The first does not apply to this framework. The second is specified straightforwardly. The third canbe encoded but raises a number of further questions for future investigation.