Experience with the KeyNote Trust Management System: Applications and Future Directions

نویسندگان

  • Matt Blaze
  • John Ioannidis
  • Angelos D. Keromytis
چکیده

Access control in distributed systems has been an area of intense research in recent years. One promising approach has been that of trust management, whereby authentication and authorization decisions are combined in a unified framework for evaluating security policies and credentials. In this paper, we report on our experience of the past seven years using the PolicyMaker and the KeyNote trust management systems in a variety of projects. We start with a brief overview of trust management in general, and KeyNote in particular; we describe several applications of trust management; we then discuss various features we found missing from our initial version of KeyNote, which would have been useful in the various applications it was used. We conclude the paper with our plans for future research.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The KeyNote Trust-Management System Version 2

This memo describes version 2 of the KeyNote trust-management system. It specifies the syntax and semantics of KeyNote ‘assertions’, describes ‘action attribute’ processing, and outlines the application architecture into which a KeyNote implementation can be fit. The KeyNote architecture and language are useful as building blocks for the trust management aspects of a variety of Internet protoco...

متن کامل

Exploiting KeyNote in WebCom: Architecture Neutral Glue for Trust Management

A practical trust management system for the WebCom distributed computing architecture is described. KeyNote credentials are used to determine the authorisation of X509 authenticated SSL connections between peers. WebCom provides a metalanguage (glue) for bringing together the components of a distributed application in such a way that the components need not concern themselves with synchronisa-t...

متن کامل

RFID: A Bibliographical Literature Review with Future Research Directions

Abstract Purpose of this paper: The purpose of this article is to review some of the most prominent applications of RFID in industries and to provide a comprehensive review of the work done from 1985 through 2007 and the research trend on that. The effectiveness of RFID and the challenges that it is facing with are also discussed. Some applications of radio frequency identification in supply ...

متن کامل

KeyNote : Trust Management for Public -

This paper discusses the rationale for designing a simple trust-management system for public-key infrastructures, called KeyNote. The motivating principles are expressiveness, simplicity, and extensibil-ity. We believe that none of the existing public-key infrastructure proposals provide as good a combination of these three factors.

متن کامل

KeyNote: Trust Management for Public-Key Infrastructures

This paper discusses the rationale for designing a simple trust-management system for public-key infrastructures, called KeyNote. The motivating principles are expressiveness, simplicity, and extensibility. We believe that none of the existing public-key infrastructure proposals provide as good a combination of these three factors.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003