Distributed Certificate-Chain Discovery in SPKI/SDSI

dc.contributor.authorSchwoon, Stefanen_US
dc.contributor.authorWang, Haoen_US
dc.contributor.authorJha, Someshen_US
dc.contributor.authorReps, Thomasen_US
dc.date.accessioned2012-03-15T17:19:04Z
dc.date.available2012-03-15T17:19:04Z
dc.date.created2005en_US
dc.date.issued2005en_US
dc.description.abstractThe authorization problem is to decide whether, according to a security policy, some principal should be allowed access to a resource. In the trust-management system SPKI/SDSI, the security policy is given by a set of certificates, and proofs of authorization take the form of certificate chains. The certificate-chain-discovery problem is to discover a proof of authorization for a given request. Although certificate-chain-discovery algorithms for SPKI/SDSI have been investigated by several researchers, previous work did not address how to perform certificate-chain discovery in distributed environments. We address the certificate-chain-discovery problem where the certificates are distributed over a number of sites, which then have to cooperate to identify the proof of authorization for a given request. We propose two protocols for this purpose. These protocols can also handle cases where certificates are labeled with weights and where multiple certificate chains must be combined to form a proof of authorization. We have implemented these protocols in a prototype and report preliminary results of our evaluation.en_US
dc.format.mimetypeapplication/pdfen_US
dc.identifier.citationTR1526en_US
dc.identifier.urihttp://digital.library.wisc.edu/1793/60438
dc.publisherUniversity of Wisconsin-Madison Department of Computer Sciencesen_US
dc.titleDistributed Certificate-Chain Discovery in SPKI/SDSIen_US
dc.typeTechnical Reporten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TR1526.pdf
Size:
2.2 MB
Format:
Adobe Portable Document Format