Networking

xDomain: Cross-Border Proofs of Access

Download Now Free registration required

Executive Summary

A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy - a technique called proof-carrying authorization. Numerous authorization logics have been proposed as vehicles by which these proofs can be expressed and checked. A challenge in building such systems is how to allow delegation between institutions that use different authorization logics. Instead of trying to develop the authorization logic that all institutions should use, the authors propose a framework for interfacing different, mutually incompatible authorization logics.

  • Format: PDF
  • Size: 521.95 KB