Experience with the KeyNote Trust Management System: Applications and Future Directions
نویسندگان
چکیده
Access control in distributed systems has been an area of intense research in recent years. One promising approach has been that of trust management, whereby authentication and authorization decisions are combined in a unified framework for evaluating security policies and credentials. In this paper, we report on our experience of the past seven years using the PolicyMaker and the KeyNote trust management systems in a variety of projects. We start with a brief overview of trust management in general, and KeyNote in particular; we describe several applications of trust management; we then discuss various features we found missing from our initial version of KeyNote, which would have been useful in the various applications it was used. We conclude the paper with our plans for future research.
منابع مشابه
The KeyNote Trust-Management System Version 2
This memo describes version 2 of the KeyNote trust-management system. It specifies the syntax and semantics of KeyNote ‘assertions’, describes ‘action attribute’ processing, and outlines the application architecture into which a KeyNote implementation can be fit. The KeyNote architecture and language are useful as building blocks for the trust management aspects of a variety of Internet protoco...
متن کاملExploiting KeyNote in WebCom: Architecture Neutral Glue for Trust Management
A practical trust management system for the WebCom distributed computing architecture is described. KeyNote credentials are used to determine the authorisation of X509 authenticated SSL connections between peers. WebCom provides a metalanguage (glue) for bringing together the components of a distributed application in such a way that the components need not concern themselves with synchronisa-t...
متن کاملRFID: A Bibliographical Literature Review with Future Research Directions
Abstract Purpose of this paper: The purpose of this article is to review some of the most prominent applications of RFID in industries and to provide a comprehensive review of the work done from 1985 through 2007 and the research trend on that. The effectiveness of RFID and the challenges that it is facing with are also discussed. Some applications of radio frequency identification in supply ...
متن کاملKeyNote : Trust Management for Public -
This paper discusses the rationale for designing a simple trust-management system for public-key infrastructures, called KeyNote. The motivating principles are expressiveness, simplicity, and extensibil-ity. We believe that none of the existing public-key infrastructure proposals provide as good a combination of these three factors.
متن کاملKeyNote: Trust Management for Public-Key Infrastructures
This paper discusses the rationale for designing a simple trust-management system for public-key infrastructures, called KeyNote. The motivating principles are expressiveness, simplicity, and extensibility. We believe that none of the existing public-key infrastructure proposals provide as good a combination of these three factors.
متن کامل