作者
Ninghui Li, William H Winsborough, John C Mitchell
发表日期
2001/11/5
图书
Proceedings of the 8th ACM Conference on Computer and Communications Security
页码范围
156-165
简介
We give goal-oriented algorithms for discovering credential chains in RTo, a role-based trust-management language introduced in this paper. The algorithms search credential graphs, a representation of RTo credentials. We prove that evaluation based on reachability in credential graphs is sound and complete with respect to the set-theoretic semantics of RTo . RTo is more expressive than SDSI 2.0, so our algorithms can perform chain discovery in SDSI 2.0, for which existing algorithms in the literature either are not goal-oriented or require using specialized logic-programming inferencing engines. Being goal-oriented enables our algorithms to be used when credential storage is distributed. We introduce a type system for credential storage that guarantees well-typed, distributed credential chains can be discovered.
引用总数
200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220234182036636259456145322820171496953425
学术搜索中的文章
N Li, WH Winsborough, JC Mitchell - Proceedings of the 8th ACM Conference on Computer …, 2001