Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A Calculus for Access Control in Distibuted Systems. ACM Transaction on Programming Languages and Systems, (15):706–734, September 1993.
B.C. Neuman. Proxy-Based Authorization and Accounting for Distributed System. In Proceedings of the 13th International Conference on Distributed Systems, May 1993.
B. Crispo and M. Lomas. A Certification Scheme for Electronic Commerce. In Security Protocol Workshop, volume LNCS series vol. 1189. Springer-Verlag, 1997.
Y. Ding, P. Horster, and H. Petersen. A New Approach for Delegation Using Hierarchical Delegation Token. In Proceedings of the 2nd Conference on Computer and Communications Security.Chapman and Hall, 1996.
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in Distributed System: Theory and Practice. ACM Transaction on Computer Systems, (10):265–310, November 1992.
M.R. Low and B. Christianson. Self Authenticating Proxies. IEE Electronics Letters, 30(2):124–125, January 1994.
C.P. Martin and K. Ramamritham. Delegation: Efficiently Rewriting History. In Proceedings of the 14th International Conference on Data Engineering, pages 266–275, April 1997.
M. Mambo, K. Usuda, and E. Okamoto. Proxy Signature for Delegating Signing Operation. In Proceedings of the 3rd ACM Conference on Computer and Communications Security, 1996.
M. Mambo, K. Usuda, and E. Okamoto. Proxy Signatures: Delegation of the Power to Sign Messages. IEICE Transaction on Fundamentals, E79-A, September, 1996.
V. Varadharajan, P. Allen, and S. Black. An Analysis of the Proxy Problem in Distributed System. In Proceedings of the IEEE Symposium on Security and Privacy, 1991.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Crispo, B. (1998). Delegation of Responsibilities. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds) Security Protocols. Security Protocols 1998. Lecture Notes in Computer Science, vol 1550. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49135-X_18
Download citation
DOI: https://doi.org/10.1007/3-540-49135-X_18
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65663-0
Online ISBN: 978-3-540-49135-4
eBook Packages: Springer Book Archive