Trust Management and Network Layer Security Protocols
We’re going to talk about some work that’s matured to the point where we’re doing our next generation of it, on managing trust and policy in network layer security. Last year at this workshop my graduate student Angelos Keromytis talked about a language we were designing for describing policies and...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | We’re going to talk about some work that’s matured to the point where we’re doing our next generation of it, on managing trust and policy in network layer security. Last year at this workshop my graduate student Angelos Keromytis talked about a language we were designing for describing policies and credentials in distributed systems aimed particularly at practical applications – a trust management system that you might actually want to use – called KeyNote. What I’m going to talk about is a specific application of that, and a more generally interesting problem that I think may lead to a slightly different way of looking at the designs of security protocols in practice. |
---|---|
ISSN: | 0302-9743 1611-3349 |
DOI: | 10.1007/10720107_17 |