Title | ||
---|---|---|
Experience with the keynote trust management system: applications and future directions |
Abstract | ||
---|---|---|
Access control in distributed systems has been an area of intense research in recent years. One promising approach has been that of trust management, whereby authentication and authorization decisions are combined in a unified framework for evaluating security policies and credentials. In this paper, we report on our experience of the past seven years using the PolicyMaker and the KeyNote trust management systems in a variety of projects. We start with a brief overview of trust management in general, and KeyNote in particular; we describe several applications of trust management; we then discuss various features we found missing from our initial version of KeyNote, which would have been useful in the various applications it was used. We conclude the paper with our plans for future research. |
Year | DOI | Venue |
---|---|---|
2003 | 10.1007/3-540-44875-6_21 | iTrust |
Keywords | Field | DocType |
various application,access control,various feature,brief overview,authorization decision,intense research,future direction,trust management,keynote trust management system,initial version,computer science,distributed system,security policy | Authentication,Computer science,Engineering management,Computer security,Authorization,Access control,Security policy,Management system,Distributed computing | Conference |
Volume | ISSN | ISBN |
2692 | 0302-9743 | 3-540-40224-1 |
Citations | PageRank | References |
30 | 1.69 | 28 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
matt blaze | 1 | 3189 | 381.70 |
John Ioannidis | 2 | 1431 | 145.33 |
Angelos D. Keromytis | 3 | 4678 | 385.02 |