{"title":"An analysis of some delegation protocols for distributed systems","authors":"Claudio Calvelli, V. Varadharajan","doi":"10.1109/CSFW.1992.236784","DOIUrl":null,"url":null,"abstract":"This papers gives a precise analysis of some of the delegation protocols described by V. Varadharajan et. al. (1991). They analysed the problem of delegation in distributed systems and proposed three delegation protocols-chained, nested and linked-based on different inter-object trust assumptions in the system. They also considered some delegation protocols for the Kerberos authentication system. The authors give an analysis of the chained, nested, and linked delegation protocols using the calculus for access control by M. Abadi et. al. (1991), and analyse the delegation protocols for Kerberos using the belief logic of R. Kaislar and V.D. Gligor (1991).<<ETX>>","PeriodicalId":350578,"journal":{"name":"[1992] Proceedings The Computer Security Foundations Workshop V","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1992] Proceedings The Computer Security Foundations Workshop V","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSFW.1992.236784","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
Abstract
This papers gives a precise analysis of some of the delegation protocols described by V. Varadharajan et. al. (1991). They analysed the problem of delegation in distributed systems and proposed three delegation protocols-chained, nested and linked-based on different inter-object trust assumptions in the system. They also considered some delegation protocols for the Kerberos authentication system. The authors give an analysis of the chained, nested, and linked delegation protocols using the calculus for access control by M. Abadi et. al. (1991), and analyse the delegation protocols for Kerberos using the belief logic of R. Kaislar and V.D. Gligor (1991).<>