Previous work has shown that distributed authorization systems that fail to sample a consistent snapshot of the underlying system during policy evaluation are vulnerable to a number of attacks. Unfortuantely, the consistency enforcement solutions presented in previous work were designed for systems in which only CA-certified evidence is used during the decision-making process, all of which is available to the decision-making node at runtime. In this article, we generalize previous results and present light-weight mechanisms through which consistency constraints can be enforced in proof systems in which the full details of a proof may be unavailable to the querier due to information release policies, and the existence of certificate authorit...
Distributed proofs are mechanisms enabling the nodes of a network to collectively and efficiently ch...
Distributed proof construction protocols have been shown to be valuable for reasoning about authoriz...
Distributed proofs are mechanisms that enable the nodes of a network to collectively and efficiently...
Previous work has shown that distributed authorization systems that fail to sample a consistent snap...
Previous work has shown that distributed authorization systems that fail to sample a consistent snap...
In distributed proof construction systems, information release policies can make it unlikely that an...
In distributed proof construction systems, information release policies can make it unlikely that an...
In distributed proof construction systems, information release policies can make it unlikely that an...
In trust negotiation and other forms of distributed proving, networked entities cooperate to form pr...
In trust negotiation and other forms of distributed proving, networked entities cooperate to form pr...
In trust negotiation and other distributed proving systems, networked entities cooperate to form pro...
In trust negotiation and other distributed proving systems, networked entities cooperate to form pro...
In trust negotiation and other distributed proving systems, networked entities cooperate to form pr...
A logic-based language is often adopted in systems for pervasive computing, because it provides a co...
Distributed proof construction protocols have been shown to be valuable for reasoning about authoriz...
Distributed proofs are mechanisms enabling the nodes of a network to collectively and efficiently ch...
Distributed proof construction protocols have been shown to be valuable for reasoning about authoriz...
Distributed proofs are mechanisms that enable the nodes of a network to collectively and efficiently...
Previous work has shown that distributed authorization systems that fail to sample a consistent snap...
Previous work has shown that distributed authorization systems that fail to sample a consistent snap...
In distributed proof construction systems, information release policies can make it unlikely that an...
In distributed proof construction systems, information release policies can make it unlikely that an...
In distributed proof construction systems, information release policies can make it unlikely that an...
In trust negotiation and other forms of distributed proving, networked entities cooperate to form pr...
In trust negotiation and other forms of distributed proving, networked entities cooperate to form pr...
In trust negotiation and other distributed proving systems, networked entities cooperate to form pro...
In trust negotiation and other distributed proving systems, networked entities cooperate to form pro...
In trust negotiation and other distributed proving systems, networked entities cooperate to form pr...
A logic-based language is often adopted in systems for pervasive computing, because it provides a co...
Distributed proof construction protocols have been shown to be valuable for reasoning about authoriz...
Distributed proofs are mechanisms enabling the nodes of a network to collectively and efficiently ch...
Distributed proof construction protocols have been shown to be valuable for reasoning about authoriz...
Distributed proofs are mechanisms that enable the nodes of a network to collectively and efficiently...