A decentralized authorization mechanism is proposed that uses Bloom filters to implement authorization delegation. This lightweight mechanism is unlike conventional approaches that typically rely on public key certificates to implement distributed delegation. In taking an approach based on one-way hash functions, the mechanism may be preferable for use in computationally constrained environments where public-key cryptography is not desirable
A Certification Authority (CA) can be used to certify keys and build a public-key infrastructure (P...
We address the problem of authorization in large-scale, open, distributed systems. Authorization dec...
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed...
Authentication and authorization systems can be found in almost every software system, and consequen...
Authorization currently introduces partial centralization in otherwise distributed network architect...
When identity-based authorization becomes difficult due to the scalability requirements and highly d...
Access control is a significant issue in any secure computer system. Authorization models provide a ...
We describe and compare several algorithms for authorization decisions from a database of certificat...
The problem of resolving conflicts in delegated authorizations has not been systematically addressed...
The problem of resolving conflicts in delegated authorizations has not been systematically addressed...
The ubiquity of the Internet has led to increased resource sharing between large numbers of users in...
This paper presents an architecture of a Personal Information Management System, in which individual...
Authentication has traditionally been done either in a decentralized manner with human assistance or...
Authorization plays an essential role to ensure the security of a wide variety of computing and IT s...
There is a recent trend toward rule-based authorization systems to achieve flexible security policie...
A Certification Authority (CA) can be used to certify keys and build a public-key infrastructure (P...
We address the problem of authorization in large-scale, open, distributed systems. Authorization dec...
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed...
Authentication and authorization systems can be found in almost every software system, and consequen...
Authorization currently introduces partial centralization in otherwise distributed network architect...
When identity-based authorization becomes difficult due to the scalability requirements and highly d...
Access control is a significant issue in any secure computer system. Authorization models provide a ...
We describe and compare several algorithms for authorization decisions from a database of certificat...
The problem of resolving conflicts in delegated authorizations has not been systematically addressed...
The problem of resolving conflicts in delegated authorizations has not been systematically addressed...
The ubiquity of the Internet has led to increased resource sharing between large numbers of users in...
This paper presents an architecture of a Personal Information Management System, in which individual...
Authentication has traditionally been done either in a decentralized manner with human assistance or...
Authorization plays an essential role to ensure the security of a wide variety of computing and IT s...
There is a recent trend toward rule-based authorization systems to achieve flexible security policie...
A Certification Authority (CA) can be used to certify keys and build a public-key infrastructure (P...
We address the problem of authorization in large-scale, open, distributed systems. Authorization dec...
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed...