DocumentCode :
2282048
Title :
Approaches to secure delegation in distributed systems
Author :
Hardjono, Thomas ; Ohta, Tadashi
Author_Institution :
ATR Int., Kyoto, Japan
fYear :
1993
fDate :
23-26 Mar 1993
Firstpage :
188
Lastpage :
194
Abstract :
The authors present two delegation schemes and a revocation scheme for distributed systems based on adaptation and extensions of the recent Csig cryptosystem of Zheng and Seberry (1992). The first delegation scheme is general in the sense that the originator of the delegation only specifies one delegate. The originator has no control over who finally executes the delegated task and who participates in the formation of the delegation chain. The second delegation scheme addresses the opposite situation which the originator specifies not only the executor of the delegated task, but also the intermediaries that form the delegation chain. The scheme has the advantage of the executor being able to verify the trustworthiness of the selected intermediaries through their correct delivery of the delegation certificate. Complementing the delegation schemes is a revocation scheme based on the notion of continued affirmation by the originator. The scheme uses a global clock to provide each component of the distributed system with a uniform time value. Affirmation tokens are derived using the time values, and failure of the originator´s affirmation token to reach the executor results in a time-out and in the revocation of the delegation
Keywords :
cryptography; distributed processing; Csig cryptosystem; distributed systems; global clock; revocation scheme; secure delegation; Authentication; Clocks; Communication system security; Cryptography; Humans;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computers and Communications, 1993., Twelfth Annual International Phoenix Conference on
Conference_Location :
Tempe, AZ
Print_ISBN :
0-7803-0922-7
Type :
conf
DOI :
10.1109/PCCC.1993.344465
Filename :
344465
Link To Document :
بازگشت