Enforcing Security Policies for Distributed Objects Applications: Transcript of Discussion

Birgit Pfitzmann: When you say you have an untrusted replica, you’re not thinking of secrets, only of integrity? Reply: Yes. Simon Foley: If you’re buying certificates that give permissions to clients how do you name the objects? Reply: There’s an actual name that is human readable, which is bound t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Popescu, Bogdan C.
Format: Buchkapitel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Birgit Pfitzmann: When you say you have an untrusted replica, you’re not thinking of secrets, only of integrity? Reply: Yes. Simon Foley: If you’re buying certificates that give permissions to clients how do you name the objects? Reply: There’s an actual name that is human readable, which is bound to an object ID. The first line of each object has to be trusted, and you as the user have to decide the object that you worry about. These are just self-certified, basically the object ID is a hash of the object key.
ISSN:0302-9743
1611-3349
DOI:10.1007/11542322_17