Enforcing Security Policies for Distributed Objects Applications: Transcript of Discussion
Birgit Pfitzmann: When you say you have an untrusted replica, you’re not thinking of secrets, only of integrity? Reply: Yes. Simon Foley: If you’re buying certificates that give permissions to clients how do you name the objects? Reply: There’s an actual name that is human readable, which is bound t...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Birgit Pfitzmann: When you say you have an untrusted replica, you’re not thinking of secrets, only of integrity?
Reply: Yes.
Simon Foley: If you’re buying certificates that give permissions to clients how do you name the objects?
Reply: There’s an actual name that is human readable, which is bound to an object ID. The first line of each object has to be trusted, and you as the user have to decide the object that you worry about. These are just self-certified, basically the object ID is a hash of the object key. |
---|---|
ISSN: | 0302-9743 1611-3349 |
DOI: | 10.1007/11542322_17 |