Size: 185
Comment:
|
Size: 4109
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
Paper: Distributed Credential Chain Discovery in Trust Management BIBLIO: Ninghui Li, William H. Winsborough, John C. Mitchell ACM Conference on Computer and Communications Security |
#pragma section-numbers off === Distributed Credential Chain Discovery in Trust Management === BIBLIO: Ninghui Li, William H. Winsborough, and John C. Mitchell. Distributed credential chain discovery in trust management (extended abstract). In Proceedings of the Eighth ACM Conference on Computer and Communications Security (CCS-8), pages 156--165. ACM Press, November 2001. Remarks: ---- === A Practically Implementable and Tractable Delegation Logic === Biblio: N. Li, B. Grosof, and J. Feigenbaum, "A Practically Implementable and Tractable Delegation Logic," to appear in Proceedings of the 2000 IEEE Symposium on Security and Privacy. Remarks: * Good writing * Based on plain datalog * Uses OLP inference engines * Discusses tractability * NO DISCUSSION of constraints or CDBs ---- === Understanding Trust Management Systems === Biblio: Weeks, S., Understanding Trust Management Systems, IEEE, 2001 http://citeseer.nj.nec.com/weeks01understanding.html Remarks: * This may be a good read for mathematical understanding of TM systems in general, but probably doesn't relate much to what I am doing. ---- === KeyNote: Trust Management for Public-Key Infrastructures === Biblio: Matt Blaze, Joan Feigenbaum, and Angelos D. Keromytis. KeyNote: Trust management for publickey infrastructures. In Proc. Cambridge 1998 Security Protocols International Workshop, pages 59--63, 1998. Remarks: * One of the first TM papers. Worth reading for back ground on KeyNote ---- === Fast access control decisions from delegation certificate databases === Biblio: Tuomas Aura. Fast access control decisions from delegation certi cate databases. In Proceedings of 3rd Australasian Conference on Information Security and Privacy ACISP '98, volume 1438 of LNCS, pages 284295, Brisbane, Australia, July 1998. Springer Verlag. Remarks: * Interesting only from the standpoint of chain discovery. * 9 citations though... ---- === SDSI A Simple Distributed Security Infrastructure === Biblio: R. L. Rivest and B. Lampson. SDSI --- A Simple Distributed Security Infrastructure. Version 1.1, at http://theory. lcs.mit.edu/rivest/sdsi11.html, October 2, 1996 Remarks: * Predecessor of SPKI/SPSI ---- === dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments === Biblio: Eric Freudenthal, Tracy Pesin, Lawrence Port, Edward Keenan, and Vijay Karamcheti. dRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments (TR2001-819). In Proceedings of the Twenty-second IEEE International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, 2002. Remarks: * The latest on dRBAC (Distributed Role-Based Access Control) * Abstract makes a good differentiation between it and other RT-systems. * More concerned with discovery than with expressiveness. ---- === Towards Practical Automated Trust Negotiation === Biblio: William H. Winsborough and Ninghui Li. Towards practical automated trust negotiation. To appear in IEEE 3rd Intl. Workshop on Policies for Distributed Systems and Networks (Policy 2002). Remarks: * Contains information about RT0 ... * Discusses the NEEDS OFF EXPRESSING some policies * Discusses the possibility of sensitive information on certificates. * Discusses ATN automated trust negotiation ---- === REFEREE: Trust Management for Web Applications === Y.-h. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick, and M. Strauss, "REFEREE: Trust Management for Web Applications," submitted for conference publication. http://citeseer.nj.nec.com/58910.html Remarks: * Under Consideration by the WWW Consortium * Does not mention datalog. ---- === The Role of Trust Management in Distributed Systems Security === M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The Role of Trust Management in Distributed Systems Security. In Secure Internet Programming 1999 (book) Paper - Previous to 1996 Remarks: * 36 Citations * Background only ---- |
Distributed Credential Chain Discovery in Trust Management
BIBLIO: Ninghui Li, William H. Winsborough, and John C. Mitchell. Distributed credential chain discovery in trust management (extended abstract). In Proceedings of the Eighth ACM Conference on Computer and Communications Security (CCS-8), pages 156--165. ACM Press, November 2001.
Remarks:
A Practically Implementable and Tractable Delegation Logic
Biblio: N. Li, B. Grosof, and J. Feigenbaum, "A Practically Implementable and Tractable Delegation Logic," to appear in Proceedings of the 2000 IEEE Symposium on Security and Privacy.
Remarks:
- Good writing
- Based on plain datalog
- Uses OLP inference engines
- Discusses tractability
- NO DISCUSSION of constraints or CDBs
Understanding Trust Management Systems
Biblio: Weeks, S., Understanding Trust Management Systems, IEEE, 2001 http://citeseer.nj.nec.com/weeks01understanding.html
Remarks:
- This may be a good read for mathematical understanding of TM systems in general, but probably doesn't relate much to what I am doing.
KeyNote: Trust Management for Public-Key Infrastructures
Biblio: Matt Blaze, Joan Feigenbaum, and Angelos D. Keromytis. KeyNote: Trust management for publickey infrastructures. In Proc. Cambridge 1998 Security Protocols International Workshop, pages 59--63, 1998.
Remarks:
One of the first TM papers. Worth reading for back ground on KeyNote
Fast access control decisions from delegation certificate databases
Biblio: Tuomas Aura. Fast access control decisions from delegation certicate databases. In Proceedings of 3rd Australasian Conference on Information Security and Privacy ACISP '98, volume 1438 of LNCS, pages 284295, Brisbane, Australia, July 1998. Springer Verlag.
Remarks:
- Interesting only from the standpoint of chain discovery.
- 9 citations though...
SDSI A Simple Distributed Security Infrastructure
Biblio: R. L. Rivest and B. Lampson. SDSI --- A Simple Distributed Security Infrastructure. Version 1.1, at http://theory. lcs.mit.edu/rivest/sdsi11.html, October 2, 1996
Remarks:
- Predecessor of SPKI/SPSI
dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments
Biblio: Eric Freudenthal, Tracy Pesin, Lawrence Port, Edward Keenan, and Vijay Karamcheti. dRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments (TR2001-819). In Proceedings of the Twenty-second IEEE International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, 2002.
Remarks:
- The latest on dRBAC (Distributed Role-Based Access Control)
- Abstract makes a good differentiation between it and other RT-systems.
- More concerned with discovery than with expressiveness.
Towards Practical Automated Trust Negotiation
Biblio: William H. Winsborough and Ninghui Li. Towards practical automated trust negotiation. To appear in IEEE 3rd Intl. Workshop on Policies for Distributed Systems and Networks (Policy 2002).
Remarks:
- Contains information about RT0 ...
- Discusses the NEEDS OFF EXPRESSING some policies
- Discusses the possibility of sensitive information on certificates.
- Discusses ATN automated trust negotiation
REFEREE: Trust Management for Web Applications
Y.-h. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick, and M. Strauss, "REFEREE: Trust Management for Web Applications," submitted for conference publication. http://citeseer.nj.nec.com/58910.html
Remarks:
- Under Consideration by the WWW Consortium
- Does not mention datalog.
The Role of Trust Management in Distributed Systems Security
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The Role of Trust Management in Distributed Systems Security. In Secure Internet Programming
1999 (book) Paper - Previous to 1996
Remarks:
- 36 Citations
- Background only