Maille Authorization A Distributed, Redundant Authorization Protocol

被引:0
|
作者
Fritz, Andrew [1 ]
Paris, Jehan-Francois [1 ]
机构
[1] Univ Houston, Dept Comp Sci, Houston, TX 77204 USA
关键词
D O I
10.1109/.2006.1629416
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Maille Authorization protocol provides flexible and reliable authorization in large distributed and pervasive computing systems. Service owners distribute their access control lists across the network using threshold cyptography. Instances of the distributed service need only verify that requestors have knowledge of a specific secret provided by the Maille Authorization system. Requestors use the Maille protocol to find and retrieve individual parts of the scattered key. Once a sufficient quorum of nodes holding the key is found, the requestor can reassemble the key and is authorized unlike extant systems, the Maille Authorization protocol has 170 single administrative point of failure and tolerates multiple simultaneous Byzantine failures.
引用
收藏
页码:265 / +
页数:2
相关论文
共 50 条
  • [1] REDUNDANT INFORMATION IN AN AUTHORIZATION MECHANISM
    WEEMS, BP
    [J]. INFORMATION SYSTEMS, 1990, 15 (02) : 269 - 279
  • [2] Distributed Authorization with Distributed Grammars
    Abadi, Martin
    Burrows, Mike
    Pucha, Himabindu
    Sadovsky, Adam
    Shankar, Asim
    Taly, Ankur
    [J]. PROGRAMMING LANGUAGES WITH APPLICATIONS TO BIOLOGY AND SECURITY: ESSAYS DEDICATED TO PIERPAOLO DEGANO ON THE OCCASION OF HIS 65TH BIRTHDAY, 2015, 9465 : 10 - 26
  • [3] Distributed Programming with Distributed Authorization
    Avijit, Kumar
    Datta, Anupam
    Harper, Robert
    [J]. TLDI '10: PROCEEDINGS OF THE 2010 ACM SIGPLAN WORKSHOP ON TYPES IN LANGUAGE DESIGN AND IMPLEMENTATION, 2010, : 27 - 38
  • [4] OAuth Web Authorization Protocol
    Leiba, Barry
    [J]. IEEE INTERNET COMPUTING, 2012, 16 (01) : 74 - 77
  • [5] Risk management for distributed authorization
    Skalka, Christian
    Wang, X.
    Chapin, Peter
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (04) : 447 - 489
  • [6] A formalization of distributed authorization with delegation
    Wang, SJ
    Zhang, Y
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2005, 3574 : 303 - 315
  • [7] Distributed Ledgers for Spectrum Authorization
    Sengul, Cigdem
    [J]. IEEE INTERNET COMPUTING, 2020, 24 (03) : 7 - 18
  • [8] Designing a distributed authorization service
    Woo, TYC
    Lam, SS
    [J]. IEEE INFOCOM '98 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS. 1-3: GATEWAY TO THE 21ST CENTURY, 1998, : 419 - 429
  • [9] Distributed Blockchain-Based Authentication and Authorization Protocol for Smart Grid
    Zhong, Yuxin
    Zhou, Mi
    Li, Jiangnan
    Chen, Jiahui
    Liu, Yan
    Zhao, Yun
    Hu, Muchuang
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [10] A practical distributed authorization system for GARA
    Adamson, WA
    Kornievskaia, O
    [J]. INFRASTUCTURE SECURITY, PROCEEDINGS, 2002, 2437 : 314 - 324