End-to-end authorization. Howell, J. & Kotz, D. In Proceedings of the 2000 Symposium on Operating Systems Design and Implementation (OSDI), pages 151-164, 10, 2000. USENIX Association. Website abstract bibtex Many boundaries impede the flow of authorization information,
forcing applications that span those boundaries into hop-by-hop approaches to
authorization. We present a unified approach to authorization. Our approach
allows applications that span administrative, network, abstraction, and
protocol boundaries to understand the end-to-end authority that justifies any
given request. The resulting distributed systems are more secure and easier
to audit. $\$par We describe boundaries that can interfere with end-to-end
authorization, and outline our unified approach. We describe the system we
built and the applications we adapted to use our unified authorization
system, and measure its costs. We conclude that our system is a practical
approach to the desirable goal of end-to-end authorization.
@inProceedings{
title = {End-to-end authorization},
type = {inProceedings},
year = {2000},
keywords = {dartmouth-cs,distributed-computing,operating-system,security},
pages = {151-164},
websites = {http://www.cs.dartmouth.edu/~dfk/papers/howell-end-to-end.pdf},
month = {10},
publisher = {USENIX Association},
id = {e46081dc-9b9d-31ee-953a-ded672f80f6e},
created = {2018-07-21T20:45:56.747Z},
file_attached = {false},
profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
last_modified = {2018-07-21T20:45:56.747Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {howell:end-to-end},
source_type = {inproceedings},
notes = {<b>From Duplicate 1 (<i>End-to-end authorization</i> - Howell, Jon; Kotz, David)<br/></b><br/>Based on the theory in howell:spki.},
private_publication = {false},
abstract = {Many boundaries impede the flow of authorization information,
forcing applications that span those boundaries into hop-by-hop approaches to
authorization. We present a unified approach to authorization. Our approach
allows applications that span administrative, network, abstraction, and
protocol boundaries to understand the end-to-end authority that justifies any
given request. The resulting distributed systems are more secure and easier
to audit. $\$par We describe boundaries that can interfere with end-to-end
authorization, and outline our unified approach. We describe the system we
built and the applications we adapted to use our unified authorization
system, and measure its costs. We conclude that our system is a practical
approach to the desirable goal of end-to-end authorization.},
bibtype = {inProceedings},
author = {Howell, Jon and Kotz, David},
booktitle = {Proceedings of the 2000 Symposium on Operating Systems Design and Implementation (OSDI)}
}
Downloads: 0
{"_id":"TnqFi5hsNtDE7B6ib","bibbaseid":"howell-kotz-endtoendauthorization-2000","downloads":0,"creationDate":"2019-02-15T15:15:02.558Z","title":"End-to-end authorization","author_short":["Howell, J.","Kotz, D."],"year":2000,"bibtype":"inProceedings","biburl":null,"bibdata":{"title":"End-to-end authorization","type":"inProceedings","year":"2000","keywords":"dartmouth-cs,distributed-computing,operating-system,security","pages":"151-164","websites":"http://www.cs.dartmouth.edu/~dfk/papers/howell-end-to-end.pdf","month":"10","publisher":"USENIX Association","id":"e46081dc-9b9d-31ee-953a-ded672f80f6e","created":"2018-07-21T20:45:56.747Z","file_attached":false,"profile_id":"f954d000-ce94-3da6-bd26-b983145a920f","group_id":"b0b145a3-980e-3ad7-a16f-c93918c606ed","last_modified":"2018-07-21T20:45:56.747Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"howell:end-to-end","source_type":"inproceedings","notes":"<b>From Duplicate 1 (<i>End-to-end authorization</i> - Howell, Jon; Kotz, David)<br/></b><br/>Based on the theory in howell:spki.","private_publication":false,"abstract":"Many boundaries impede the flow of authorization information,\nforcing applications that span those boundaries into hop-by-hop approaches to\nauthorization. We present a unified approach to authorization. Our approach\nallows applications that span administrative, network, abstraction, and\nprotocol boundaries to understand the end-to-end authority that justifies any\ngiven request. The resulting distributed systems are more secure and easier\nto audit. $\\$par We describe boundaries that can interfere with end-to-end\nauthorization, and outline our unified approach. We describe the system we\nbuilt and the applications we adapted to use our unified authorization\nsystem, and measure its costs. We conclude that our system is a practical\napproach to the desirable goal of end-to-end authorization.","bibtype":"inProceedings","author":"Howell, Jon and Kotz, David","booktitle":"Proceedings of the 2000 Symposium on Operating Systems Design and Implementation (OSDI)","bibtex":"@inProceedings{\n title = {End-to-end authorization},\n type = {inProceedings},\n year = {2000},\n keywords = {dartmouth-cs,distributed-computing,operating-system,security},\n pages = {151-164},\n websites = {http://www.cs.dartmouth.edu/~dfk/papers/howell-end-to-end.pdf},\n month = {10},\n publisher = {USENIX Association},\n id = {e46081dc-9b9d-31ee-953a-ded672f80f6e},\n created = {2018-07-21T20:45:56.747Z},\n file_attached = {false},\n profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},\n group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},\n last_modified = {2018-07-21T20:45:56.747Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {howell:end-to-end},\n source_type = {inproceedings},\n notes = {<b>From Duplicate 1 (<i>End-to-end authorization</i> - Howell, Jon; Kotz, David)<br/></b><br/>Based on the theory in howell:spki.},\n private_publication = {false},\n abstract = {Many boundaries impede the flow of authorization information,\nforcing applications that span those boundaries into hop-by-hop approaches to\nauthorization. We present a unified approach to authorization. Our approach\nallows applications that span administrative, network, abstraction, and\nprotocol boundaries to understand the end-to-end authority that justifies any\ngiven request. The resulting distributed systems are more secure and easier\nto audit. $\\$par We describe boundaries that can interfere with end-to-end\nauthorization, and outline our unified approach. We describe the system we\nbuilt and the applications we adapted to use our unified authorization\nsystem, and measure its costs. We conclude that our system is a practical\napproach to the desirable goal of end-to-end authorization.},\n bibtype = {inProceedings},\n author = {Howell, Jon and Kotz, David},\n booktitle = {Proceedings of the 2000 Symposium on Operating Systems Design and Implementation (OSDI)}\n}","author_short":["Howell, J.","Kotz, D."],"urls":{"Website":"http://www.cs.dartmouth.edu/~dfk/papers/howell-end-to-end.pdf"},"bibbaseid":"howell-kotz-endtoendauthorization-2000","role":"author","keyword":["dartmouth-cs","distributed-computing","operating-system","security"],"downloads":0},"search_terms":["end","end","authorization","howell","kotz"],"keywords":["dartmouth-cs","distributed-computing","operating-system","security","distributed computing","operating system"],"authorIDs":["5c66d9b9e4b1db10000001ba","5c69efe6ac591010000000e0"]}