Trust Management and Network Layer Security Protocols

We’re going to talk about some work that’s matured to the point where we’re doing our next generation of it, on managing trust and policy in network layer security. Last year at this workshop my graduate student Angelos Keromytis talked about a language we were designing for describing policies and...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Blaze, Matt
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:We’re going to talk about some work that’s matured to the point where we’re doing our next generation of it, on managing trust and policy in network layer security. Last year at this workshop my graduate student Angelos Keromytis talked about a language we were designing for describing policies and credentials in distributed systems aimed particularly at practical applications – a trust management system that you might actually want to use – called KeyNote. What I’m going to talk about is a specific application of that, and a more generally interesting problem that I think may lead to a slightly different way of looking at the designs of security protocols in practice.
ISSN:0302-9743
1611-3349
DOI:10.1007/10720107_17