Abstract
Trust Management systems use security credentials to determine whether action requests are authorized. This paper examines how they might be used in determining whether requests for delegation are safe.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
T. Aura and C Ellison. Privacy and accountability in certificate systems. Technical Report HUT-TCS-A61, Helsinki University of Technology, Laboratory for Theoretical Computer Science, 2000.
T. Beth, M. Borcherding, and H. Klein. Valuation of trust in open networks. In European Symposium on Research in Computer Security, LNCS 875. Springer Verlag, 1994.
M Blaze et al. The keynote trust-management system version 2. September 1999. Internet Request For Comments 2704.
C Ellison et al. Spki certificate theory. September 1999. Internet Request for Comments: 2693.
S.N. Foley, T.B. Quillinan, J.P. Morrison, D.A. Power, and J.J. Kennedy. Exploiting KeyNote in WebCom: Architecture neutral glue for trust management. In Proceedings of The Fifth Nordic Workshop on Secure IT Systems, Reykjavik, Iceland, Oct 2001.
J.K. Millen and R.N. Wright. Reasoning about trust and insurance in a public key infrastructure. In Computer Security Foundations Workshop. IEEE Computer Society Press, 2000.
John P. Morrison and David A. Power. Master promotion and client redirection in the webcom system. In PDPTA, Las Vegas USA, 2000.
J.P. Morrison, D.A. Power, and J.J. Kennedy. A Condensed Graphs Engine to Drive Metacomputing. Proceedings of the international conference on parallel and distributed processing techniques and applications (PDPTA’ 99), Las Vagas, Nevada, June 28-July 1, 1999.
M.K. Reiter and S.G. Stubblebine. Authentication metric analysis and design. ACM Transactions on Information and System Security, 2(2):138–158, 1999.
I Watson and F Marir. Case based reasoning review. The Knowledge Engineering Review, 9(4), 1994.
P. Zimmermann. The Official PGP Users Guide. MIT Press, 1995.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Foley, S.N. (2002). Trust Management and Whether to Delegate. In: Christianson, B., Malcolm, J.A., Crispo, B., Roe, M. (eds) Security Protocols. Security Protocols 2001. Lecture Notes in Computer Science, vol 2467. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45807-7_23
Download citation
DOI: https://doi.org/10.1007/3-540-45807-7_23
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44263-9
Online ISBN: 978-3-540-45807-4
eBook Packages: Springer Book Archive