Provided by: University Circle Inc.
Date Added: Dec 2012
Access control systems such as are intended to provide a decentralized approach to constructing and interpreting authorization relationships between principals (public keys). A decentralized authorization mechanism is proposed that uses Bloom filters to implement authorization delegation. This lightweight mechanism is unlike conventional approaches that typically rely on public key certificates to implement distributed delegation. In taking an approach based on one-way hash functions, the mechanism may be preferable for use in computationally constrained environments where public-key cryptography is not desirable.