Abstract
With decentralized authorization comes the challenge of ensuring that when a credential is written, then it precisely captures the delegation that is intended. A request for a particular service may be unexpectedly rejected, despite the requester having credentials for what should be considered a comparable service. This paper considers how techniques that support imprecision in Case-Based Reasoning Systems might be used when delegating and checking authorizations in the KeyNote trust management system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Apache-ssl release version 1.3.6/1.36. Open source software distribution. Available from URL, http://www.apache.org
Aura, T., Ellison, C.: Privacy and accountability in certificate systems. Technical Report HUT-TCS-A61, Helsinki University of Technology, Laboratory for Theoretical Computer Science (2000)
Blaze, M., et al.: The keynote trust-management system version 2, Internet Request For Comments 2704 (September 1999)
Blaze, M., et al.: The role of trust management in distributed systems security. In: Secure Internet Programming: Issues in Distributed and Mobile Object Systems. LNCS. Springer, Heidelberg (1999)
Blaze, M., Ioannidis, J., Keromytis, A.D.: Trust management and network layer security protocols. In: Security Protocols International Workshop. LNCS. Springer, Heidelberg (1999)
Ellison, C., et al.: SPKI certificate theory, Internet Request for Comments: 2693 (September 1999)
Foley, S.N., Quillinan, T.B., Morrison, J.P.: Secure component distribution using WebCom. In: Proceeding of the 17th International Conference on Information Security (IFIP/SEC 2002), Cairo, Egypt (May 2002)
Foley, S.N.: Trust management and whether to delegate. In: International Workshop on Security protocols, Cambridge, UK. Springer, Heidelberg (2001)
Osborne, H., Bridge, D.: Models of similarity for case-based reasoning. In: Cambouropolos, E., Ramscar, M., Hahn, U., Pain, H. (eds.) Procs. of the Interdisciplinary Workshop on Similarity and Categorisation, pp. 173–179 (1997)
Watson, I., Marir, F.: Case based reasoning review. The Knowledge Engineering Review 9(4) (1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Foley, S.N. (2004). Supporting Imprecise Delegation in KeyNote. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2002. Lecture Notes in Computer Science, vol 2845. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39871-4_15
Download citation
DOI: https://doi.org/10.1007/978-3-540-39871-4_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20830-3
Online ISBN: 978-3-540-39871-4
eBook Packages: Springer Book Archive