Relationship-based access control: protection model and policy language

PWL Fong - Proceedings of the first ACM conference on Data and …, 2011 - dl.acm.org
Social Network Systems pioneer a paradigm of access control that is distinct from traditional
approaches to access control. Gates coined the term Relationship-Based Access Control …

Threshold delegatable anonymous credentials with controlled and fine-grained delegation

O Mir, D Slamanig, R Mayrhofer - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Anonymous credential systems allow users to obtain a credential on multiple attributes from
an organization and then present it to verifiers in a way that no information beyond what …

Delegatable functional signatures

M Backes, S Meiser, D Schröder - … Conference on Practice and Theory in …, 2016 - Springer
We introduce delegatable functional signatures (DFS) which support the delegation of
signing capabilities to another party, called the evaluator, with respect to a functionality F F …

Distributed computer systems with time-dependent credentials

M Novak, PJ Leach, Y Zeng, S Sinha, KM Short… - US Patent …, 2014 - Google Patents
US 2013/OO61301A1 Mar. 7, 2013(57) ABSTRACT 51) Int. CA distributed system in which
time-dependent credentials are (51) o 2I/00(2013.01) supplied by controllers that operate …

Resource-aware authorization policies for statically typed cryptographic protocols

M Bugliesi, S Calzavara, F Eigner… - 2011 IEEE 24th …, 2011 - ieeexplore.ieee.org
Type systems for authorization are a popular device for the specification and verification of
security properties in cryptographic applications. Though promising, existing frameworks …

Moving and relocating: A logical framework of service migration for software system survivability

Y Zuo - 2013 IEEE 7th International Conference on Software …, 2013 - ieeexplore.ieee.org
Given the increasing scale and complexity of cyberattacks, innovative techniques must be
developed to effectively respond to intrusions and enable affected software systems to …

[PDF][PDF] Highly Controlled, Fine-grained Delegation of Signing Capabilities.

M Backes, S Meiser, D Schröder - IACR Cryptol. ePrint Arch., 2013 - Citeseer
Delegation of signing rights is a central problem in security. Whereas delegating by giving
power of attorney is well studied and digitally realized via delegatable anonymous …

Stateful authorization logic: Proof theory and a case study

D Garg, F Pfenning - Security and Trust Management: 6th International …, 2011 - Springer
Authorization policies can be conveniently represented and reasoned about in logic. Proof
theory is important for many such applications of logic. However, so far, there has been no …

Incorporating constraints to software system survivability specification and proof

Y Zuo - 2012 Sixth International Symposium on Theoretical …, 2012 - ieeexplore.ieee.org
In component-based and model-driven approaches for software engineering, any software
components or subsystems acquired from external sources must meet a user's criteria to …

Compliance checking for usage-constrained credentials in trust negotiation systems

J Hu, KM Khan, Y Bai, Y Zhang - … September 19-21, 2012. Proceedings 15, 2012 - Springer
We propose an approach to placing usage-constraints on RT credentials; issuers specify
constraints by designing non-deterministic finite automata. We show by examples that this …