A Bloom Filter Based Model for Decentralized Authorization. Foley, S. N. & Navarro-Arribas, G. International Journal of Intelligent Systems, 28(6):565-582, 2013. ISSN: 0884-8173, JCR2013SCI: 1.411 (Q2)Paper Pdf doi abstract bibtex A decentralized authorization mechanism is proposed that uses Bloom filters to implement authorization delegation. This lightweight mechanism is unlike conventional approaches that typically rely on public key certificates to implement distributed delegation. In taking an approach based on one-way hash functions, the mechanism may be preferable for use in computationally constrained environments where public-key cryptography is not desirable.
@article{foley.etal.2013:_a_bloom_filter_based_model,
title = {A Bloom Filter Based Model for Decentralized Authorization},
volume = 28,
copyright = {2013 Wiley Periodicals, Inc.},
issn = {1098-{111X}},
url =
{http://onlinelibrary.wiley.com/doi/10.1002/int.21593/abstract},
doi = {10.1002/int.21593},
abstract = {A decentralized authorization mechanism is proposed that
uses Bloom filters to implement authorization delegation.
This lightweight mechanism is unlike conventional approaches
that typically rely on public key certificates to implement
distributed delegation. In taking an approach based on
one-way hash functions, the mechanism may be preferable for
use in computationally constrained environments where
public-key cryptography is not desirable.},
language = {en},
number = 6,
urldate = {2013-07-18},
journal = {International Journal of Intelligent Systems},
author = {Foley, S. N. and Navarro-Arribas, G.},
year = 2013,
pages = {565-582},
note = {ISSN: 0884-8173, JCR2013SCI: 1.411 (Q2)},
url_pdf={http://www.deic.uab.cat/~guille/publications/papers/2013.jcr.foley-navarro.ijis.pdf},}
Downloads: 0
{"_id":"GdtAWApHYTYRRM9C8","bibbaseid":"foley-navarroarribas-abloomfilterbasedmodelfordecentralizedauthorization-2013","authorIDs":["5e6808c6c1fce0de01000298","5e681c7bdfcfe3de010000da","5e681d86dfcfe3de010000f7","5e681e9fdfcfe3de01000123","5e681ff7dfcfe3de0100015b","5e68d55eae547ede01000241","FbhxrzRGHmB5ZLkdW","Rq2LaHi2k4LG2oJWA","XPSxWaR7aNza6tAag","bDunKxAWaFaoSZHTh","ep5R5PJemmENxrMNS","xepEiEC24XXQFT8fb"],"author_short":["Foley, S. N.","Navarro-Arribas, G."],"bibdata":{"bibtype":"article","type":"article","title":"A Bloom Filter Based Model for Decentralized Authorization","volume":"28","copyright":"2013 Wiley Periodicals, Inc.","issn":"1098-111X","url":"http://onlinelibrary.wiley.com/doi/10.1002/int.21593/abstract","doi":"10.1002/int.21593","abstract":"A decentralized authorization mechanism is proposed that uses Bloom filters to implement authorization delegation. This lightweight mechanism is unlike conventional approaches that typically rely on public key certificates to implement distributed delegation. In taking an approach based on one-way hash functions, the mechanism may be preferable for use in computationally constrained environments where public-key cryptography is not desirable.","language":"en","number":"6","urldate":"2013-07-18","journal":"International Journal of Intelligent Systems","author":[{"propositions":[],"lastnames":["Foley"],"firstnames":["S.","N."],"suffixes":[]},{"propositions":[],"lastnames":["Navarro-Arribas"],"firstnames":["G."],"suffixes":[]}],"year":"2013","pages":"565-582","note":"ISSN: 0884-8173, JCR2013SCI: 1.411 (Q2)","url_pdf":"http://www.deic.uab.cat/~guille/publications/papers/2013.jcr.foley-navarro.ijis.pdf","bibtex":"@article{foley.etal.2013:_a_bloom_filter_based_model,\n title = {A Bloom Filter Based Model for Decentralized Authorization},\n volume = 28,\n copyright = {2013 Wiley Periodicals, Inc.},\n issn = {1098-{111X}},\n url =\n {http://onlinelibrary.wiley.com/doi/10.1002/int.21593/abstract},\n doi = {10.1002/int.21593},\n abstract = {A decentralized authorization mechanism is proposed that\n uses Bloom filters to implement authorization delegation.\n This lightweight mechanism is unlike conventional approaches\n that typically rely on public key certificates to implement\n distributed delegation. In taking an approach based on\n one-way hash functions, the mechanism may be preferable for\n use in computationally constrained environments where\n public-key cryptography is not desirable.},\n language = {en},\n number = 6,\n urldate = {2013-07-18},\n journal = {International Journal of Intelligent Systems},\n author = {Foley, S. N. and Navarro-Arribas, G.},\n year = 2013,\n pages = {565-582},\n note = {ISSN: 0884-8173, JCR2013SCI: 1.411 (Q2)},\nurl_pdf={http://www.deic.uab.cat/~guille/publications/papers/2013.jcr.foley-navarro.ijis.pdf},}\n\n","author_short":["Foley, S. N.","Navarro-Arribas, G."],"key":"foley.etal.2013:_a_bloom_filter_based_model","id":"foley.etal.2013:_a_bloom_filter_based_model","bibbaseid":"foley-navarroarribas-abloomfilterbasedmodelfordecentralizedauthorization-2013","role":"author","urls":{"Paper":"http://onlinelibrary.wiley.com/doi/10.1002/int.21593/abstract"," pdf":"http://www.deic.uab.cat/~guille/publications/papers/2013.jcr.foley-navarro.ijis.pdf"},"downloads":0,"html":""},"bibtype":"article","biburl":"http://www.deic.uab.cat/~guille/fullbib.bib","creationDate":"2020-03-10T21:38:14.407Z","downloads":0,"keywords":[],"search_terms":["bloom","filter","based","model","decentralized","authorization","foley","navarro-arribas"],"title":"A Bloom Filter Based Model for Decentralized Authorization","year":2013,"dataSources":["MhcFKWEyNPt5DaDvq"]}