Towards Practical and Secure Decentralized Attribute-based Authorization Systems

@inproceedings{Lee2008TowardsPA,
  title={Towards Practical and Secure Decentralized Attribute-based Authorization Systems},
  author={Adam J. Lee},
  year={2008}
}
The ubiquity of the Internet has led to increased resource sharing between large numbers of users in widely-disparate administrative domains. Unfortunately, traditional identity-based solutions to the authorization problem do not allow for the dynamic establishment of trust, and thus cannot be used to facilitate interactions between previously-unacquainted parties. Furthermore, the management of identity-based systems becomes burdensome as the number of users in the system increases. To address… CONTINUE READING

Citations

Publications citing this paper.
Showing 1-5 of 5 extracted citations

Practical Decentralized Attribute-Based Delegation Using Secure Name Systems

2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) • 2018
View 2 Excerpts

References

Publications referenced by this paper.
Showing 1-10 of 111 references

A Flexible Policy-Driven Trust Negotiation Model

2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT'07) • 2007
View 6 Excerpts
Highly Influenced

Scalability in a Secure Distributed Proof System

Pervasive • 2006
View 20 Excerpts
Highly Influenced

Rete: A fast algorithm for the many pattern/many object pattern match problem

Charles L. Forgy
Artificial Intelligence, • 1985
View 20 Excerpts
Highly Influenced

Web Services Policy 1.2—Framework (WS- Policy)

Jeffrey Schlimmer Editor
W3C Member Submission, • 2006
View 6 Excerpts
Highly Influenced

Distributed proving in access-control systems

2005 IEEE Symposium on Security and Privacy (S&P'05) • 2005
View 19 Excerpts
Highly Influenced

PeerAccess: a logic for distributed authorization

ACM Conference on Computer and Communications Security • 2005
View 12 Excerpts
Highly Influenced

Secure Context-Sensitive Authorization

PerCom • 2005
View 20 Excerpts
Highly Influenced

Cassandra: distributed access control policies with tunable expressiveness

Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004. • 2004
View 20 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…