Credential chain discovery in RTT trust management language

3Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The goal of this paper is to explore the potential of Role based Trust management language RTT as a means for specifying security policies and using credentials to ensure that confidential resources are not being granted to unauthorized users. The paper describes formally the syntax and semantics of the language and defines RTT credential graphs and credential chains as a means for answering security queries. Backward and forward search algorithms to build a credential chain are given. © Springer-Verlag 2010.

Cite

CITATION STYLE

APA

Sacha, K. (2010). Credential chain discovery in RTT trust management language. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6258 LNCS, pp. 195–208). https://doi.org/10.1007/978-3-642-14706-7_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free