Abuse Freedom in Access Control Schemes

  • Authors:
  • Anat Talmy;Oren Dobzinski

  • Affiliations:
  • Carnegie Mellon University, PA;Carnegie Mellon University, PA

  • Venue:
  • AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present a protocol for access control in which any entity can prove its access privileges only to designated servers. This generalizes the problem of abuse freedom to the question of access control. If an abuse free access control device is captured by a malicious party, the information about places or resources it can access would not be revealed to the capturing party.