A survey of trust in internet applications

T Grandison, M Sloman - IEEE Communications Surveys & …, 2000 - ieeexplore.ieee.org
Trust is an important aspect of decision making for Internet applications and particularly
influences the specification of security policy, ie, who is authorized to perform actions as well …

Trust management of services in cloud environments: Obstacles and solutions

TH Noor, QZ Sheng, S Zeadally, J Yu - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
Trust management is one of the most challenging issues in the emerging cloud computing
area. Over the past few years, many studies have proposed different techniques to address …

Secure attribute-based systems

M Pirretti, P Traynor, P McDaniel, B Waters - Proceedings of the 13th …, 2006 - dl.acm.org
Attributes define, classify, or annotate the datum to which they are assigned. However,
traditional attribute architectures and cryptosystems are ill-equipped to provide security in …

KeyNote: Trust Management for Public-Key Infrastructures: Position Paper

M Blaze, J Feigenbaum, AD Keromytis - … , April 15–17, 1998 Proceedings 6, 1999 - Springer
This paper discusses the rationale for designing a simple trust-management system for
public-key infrastructures, called KeyNote. The motivating principles are expressibility …

[HTML][HTML] Distributed firewalls

SM Bellovin - 1999 - usenix.org
Conventional firewalls [5] rely on the notions of restricted topology and controlled entry
points to function. More precisely, they rely on the assumption that everyone on one side of …

The role of trust management in distributed systems security

M Blaze, J Feigenbaum, J Ioannidis… - … : security issues for …, 1999 - Springer
Existing authorization mechanisms fail to provide powerful and robust tools for handling
security at the scale necessary for today's Internet. These mechanisms are coming under …

Fourth-factor authentication: somebody you know

J Brainard, A Juels, RL Rivest, M Szydlo… - Proceedings of the 13th …, 2006 - dl.acm.org
User authentication in computing systems traditionally depends on three factors: something
you have (eg, a hardware token), something you are (eg, a fingerprint), and something you …

Enforcing access control in web-based social networks

B Carminati, E Ferrari, A Perego - ACM Transactions on Information and …, 2009 - dl.acm.org
In this article, we propose an access control mechanism for Web-based social networks,
which adopts a rule-based approach for specifying access policies on the resources owned …

Delegation logic: A logic-based approach to distributed authorization

N Li, BN Grosof, J Feigenbaum - ACM Transactions on Information and …, 2003 - dl.acm.org
We address the problem of authorization in large-scale, open, distributed systems.
Authorization decisions are needed in electronic commerce, mobile-code execution, remote …

Distributed credential chain discovery in trust management

N Li, WH Winsborough, JC Mitchell - … of the 8th ACM Conference on …, 2001 - dl.acm.org
We give goal-oriented algorithms for discovering credential chains in RT o, a role-based
trust-management language introduced in this paper. The algorithms search credential …