A distributed proof system is an effective way for deriving useful information by combining data from knowledge bases managed by multiple different principals across different administrative domains. As such, many researchers have proposed using these types of systems as a foundation for distributed authorization and trust management in decentralized systems. However, to account for the potentially sensitive nature of the underlying information, it is important that such proof systems be able to protect the confidentiality of the logical facts and statements.\ud \ud In this paper, we explore the design space of sound and safe confidentiality-preserving distributed proof systems. Specifically, we develop a framework to analyze the theoretica...
In distributed proof construction systems, information release policies can make it unlikely that an...
Abstract. Secrecy and authenticity properties of protocols are mutu-ally dependent: every authentica...
© 2017 Kim Sasha RamchenA fundamental problem in large distributed systems is how to enable parties ...
A distributed proof system is an effective way for deriving useful information by combining data fro...
A distributed proof system is an effective way for deriv-ing useful information by combining data fr...
Distributed proof construction protocols have been shown to be valuable for reasoning about authoriz...
Distributed proof construction protocols have been shown to be valuable for reasoning about authoriz...
In trust negotiation and other forms of distributed proving, networked entities cooperate to form pr...
Previous work has shown that distributed authorization systems that fail to sample a consistent snap...
A logic-based language is often adopted in systems for pervasive computing, because it provides a co...
Previous work has shown that distributed authorization systems that fail to sample a consistent snap...
In distributed proof construction systems, information release policies can make it unlikely that an...
We present a case study in verified security for realistic systems: the implementation of a conferen...
Privacy, copyright, security and other concerns make it essential for many distributed web applicati...
In distributed proof construction systems, information release policies can make it unlikely that an...
In distributed proof construction systems, information release policies can make it unlikely that an...
Abstract. Secrecy and authenticity properties of protocols are mutu-ally dependent: every authentica...
© 2017 Kim Sasha RamchenA fundamental problem in large distributed systems is how to enable parties ...
A distributed proof system is an effective way for deriving useful information by combining data fro...
A distributed proof system is an effective way for deriv-ing useful information by combining data fr...
Distributed proof construction protocols have been shown to be valuable for reasoning about authoriz...
Distributed proof construction protocols have been shown to be valuable for reasoning about authoriz...
In trust negotiation and other forms of distributed proving, networked entities cooperate to form pr...
Previous work has shown that distributed authorization systems that fail to sample a consistent snap...
A logic-based language is often adopted in systems for pervasive computing, because it provides a co...
Previous work has shown that distributed authorization systems that fail to sample a consistent snap...
In distributed proof construction systems, information release policies can make it unlikely that an...
We present a case study in verified security for realistic systems: the implementation of a conferen...
Privacy, copyright, security and other concerns make it essential for many distributed web applicati...
In distributed proof construction systems, information release policies can make it unlikely that an...
In distributed proof construction systems, information release policies can make it unlikely that an...
Abstract. Secrecy and authenticity properties of protocols are mutu-ally dependent: every authentica...
© 2017 Kim Sasha RamchenA fundamental problem in large distributed systems is how to enable parties ...