Skip to main content

Supporting Imprecise Delegation in KeyNote

  • Conference paper
  • 344 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2845))

Abstract

With decentralized authorization comes the challenge of ensuring that when a credential is written, then it precisely captures the delegation that is intended. A request for a particular service may be unexpectedly rejected, despite the requester having credentials for what should be considered a comparable service. This paper considers how techniques that support imprecision in Case-Based Reasoning Systems might be used when delegating and checking authorizations in the KeyNote trust management system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Apache-ssl release version 1.3.6/1.36. Open source software distribution. Available from URL, http://www.apache.org

  2. Aura, T., Ellison, C.: Privacy and accountability in certificate systems. Technical Report HUT-TCS-A61, Helsinki University of Technology, Laboratory for Theoretical Computer Science (2000)

    Google Scholar 

  3. Blaze, M., et al.: The keynote trust-management system version 2, Internet Request For Comments 2704 (September 1999)

    Google Scholar 

  4. Blaze, M., et al.: The role of trust management in distributed systems security. In: Secure Internet Programming: Issues in Distributed and Mobile Object Systems. LNCS. Springer, Heidelberg (1999)

    Google Scholar 

  5. Blaze, M., Ioannidis, J., Keromytis, A.D.: Trust management and network layer security protocols. In: Security Protocols International Workshop. LNCS. Springer, Heidelberg (1999)

    Google Scholar 

  6. Ellison, C., et al.: SPKI certificate theory, Internet Request for Comments: 2693 (September 1999)

    Google Scholar 

  7. Foley, S.N., Quillinan, T.B., Morrison, J.P.: Secure component distribution using WebCom. In: Proceeding of the 17th International Conference on Information Security (IFIP/SEC 2002), Cairo, Egypt (May 2002)

    Google Scholar 

  8. Foley, S.N.: Trust management and whether to delegate. In: International Workshop on Security protocols, Cambridge, UK. Springer, Heidelberg (2001)

    Google Scholar 

  9. Osborne, H., Bridge, D.: Models of similarity for case-based reasoning. In: Cambouropolos, E., Ramscar, M., Hahn, U., Pain, H. (eds.) Procs. of the Interdisciplinary Workshop on Similarity and Categorisation, pp. 173–179 (1997)

    Google Scholar 

  10. Watson, I., Marir, F.: Case based reasoning review. The Knowledge Engineering Review 9(4) (1994)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Foley, S.N. (2004). Supporting Imprecise Delegation in KeyNote. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2002. Lecture Notes in Computer Science, vol 2845. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39871-4_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39871-4_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20830-3

  • Online ISBN: 978-3-540-39871-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics