The Internet enables connectivity between many strangers- entities that don't know each other. We present the Trust Policy Language (TPL), used to define the mapping of strangers to predefined business roles, based on certificates issued by third parties. TPL is expressive enough to allow complex policies, e.g. nonmonotone (negative) certificates, while being simple enough to allow automated policy checking and processing. Issuers of certificates are either known in advance, or provide sufficient certificates to be considered a trusted authority according to the policy. This allows bottom-up, ‘grass roots ’ buildup of trust, as in the real world. We extend, rather than replace, existing role-based access control mechanisms. This provid...
In this note we consider how role-based access control can be managed on a large scale over the Inte...
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propaga...
Trust policies enable the automated processing of trust decisions for electronic transactions. We co...
A new approach to the deployment of public key infrastructure is presented, based on a separation be...
open access journalA Public Key Infrastructure (PKI) is considered one of the most important techniq...
In open systems like the Internet, traditional approaches to security based on identity do not provi...
International audienceA Public Key Infrastructure (PKI) is considered one of the most important tech...
International audienceA Public Key Infrastructure (PKI) is considered one of the most important tech...
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propaga...
This paper is a natural continuation of previous research on the implementation of confidentiality i...
International audienceThe spread of high-speed networks changes the way in which organizations manag...
Multidomain environments where multiple organizations interoperate with each other are becoming a re...
We have implemented and deployed an access control mechanism that uses digitally-signed certificates...
The concept of trusted platforms using trusted computing technology such as the Trusted Platform Mod...
Multidomain environments where multiple organizations interoperate with each other are becoming a re...
In this note we consider how role-based access control can be managed on a large scale over the Inte...
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propaga...
Trust policies enable the automated processing of trust decisions for electronic transactions. We co...
A new approach to the deployment of public key infrastructure is presented, based on a separation be...
open access journalA Public Key Infrastructure (PKI) is considered one of the most important techniq...
In open systems like the Internet, traditional approaches to security based on identity do not provi...
International audienceA Public Key Infrastructure (PKI) is considered one of the most important tech...
International audienceA Public Key Infrastructure (PKI) is considered one of the most important tech...
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propaga...
This paper is a natural continuation of previous research on the implementation of confidentiality i...
International audienceThe spread of high-speed networks changes the way in which organizations manag...
Multidomain environments where multiple organizations interoperate with each other are becoming a re...
We have implemented and deployed an access control mechanism that uses digitally-signed certificates...
The concept of trusted platforms using trusted computing technology such as the Trusted Platform Mod...
Multidomain environments where multiple organizations interoperate with each other are becoming a re...
In this note we consider how role-based access control can be managed on a large scale over the Inte...
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propaga...
Trust policies enable the automated processing of trust decisions for electronic transactions. We co...