Despite recent widespread interest in the secure authentication of principals across computer networks there has been considerably less discussion of distributed mechanisms to support authorization and accounting. By generalizing the authentication model to support restricted proxies, both authorization and accounting can be easily supported. This paper presents the proxy model for authorization and shows how the model can be used to support a wide range of authorization and accounting mechanisms. The proxy model strikes a balance between access-control-list and capability-based mechanisms allowing each to be used where appropriate and allowing their use in combination. The paper describes how restricted proxies can be supported using exist...
When identity-based authorization becomes difficult due to the scalability requirements and highly d...
We describe a system whose purpose is to explore the use of certificates for the distributed manage...
Access control is a significant issue in any secure computer system. Authorization models provide a ...
In recent years there has been much interest in the secure authentication of principals across compu...
While there has been considerable effort in creating a single sign-on solution for interoperability ...
While there has been considerable effort in creating a single sign-on solution for interoperability ...
Authorization plays an essential role to ensure the security of a wide variety of computing and IT s...
) Thomas Y.C. Woo Simon S. Lam Department of Computer Sciences The University of Texas at Austin Au...
Distributed authorization provides the ability to control access to resources spread over the Intern...
The ubiquity of the Internet has led to increased resource sharing between large numbers of users in...
This paper describes a security system for authorization in open networks. Authorization means autho...
In most systems, authorization is specified using some low-level system-specific mechanisms, e.g. pr...
Abstract. Existing authorization mechanisms fail to provide powerful and robust tools for handling s...
Authorization currently introduces partial centralization in otherwise distributed network architect...
This paper addresses the issues of authorization and trust in a federated distributed environment. W...
When identity-based authorization becomes difficult due to the scalability requirements and highly d...
We describe a system whose purpose is to explore the use of certificates for the distributed manage...
Access control is a significant issue in any secure computer system. Authorization models provide a ...
In recent years there has been much interest in the secure authentication of principals across compu...
While there has been considerable effort in creating a single sign-on solution for interoperability ...
While there has been considerable effort in creating a single sign-on solution for interoperability ...
Authorization plays an essential role to ensure the security of a wide variety of computing and IT s...
) Thomas Y.C. Woo Simon S. Lam Department of Computer Sciences The University of Texas at Austin Au...
Distributed authorization provides the ability to control access to resources spread over the Intern...
The ubiquity of the Internet has led to increased resource sharing between large numbers of users in...
This paper describes a security system for authorization in open networks. Authorization means autho...
In most systems, authorization is specified using some low-level system-specific mechanisms, e.g. pr...
Abstract. Existing authorization mechanisms fail to provide powerful and robust tools for handling s...
Authorization currently introduces partial centralization in otherwise distributed network architect...
This paper addresses the issues of authorization and trust in a federated distributed environment. W...
When identity-based authorization becomes difficult due to the scalability requirements and highly d...
We describe a system whose purpose is to explore the use of certificates for the distributed manage...
Access control is a significant issue in any secure computer system. Authorization models provide a ...