Istituto di Informatica e Telematica     
Dianda F., Giuntini F., Martinelli F., Vaccarelli A. Access control: AAAA where the first two As stand for Ability Authentication. Technical report, 2004.
We investigate the notion of authentication procedure. We show how this can be split in several phases: establishing that an ability can be performed, deducing a certain information from such an ability, witnessing the authenticity of the information deduced by the ability. In our framework, ability means that that one is able to perform role in a protocol. We argue that the concept of ability authentication is more general that the one of identity authentication, that is commonly used in AAA systems. We then develop an architecture for managing abilities and we show some application scenarios.
Subject Access control
Authentication procedures
K.6.5 Security and Protection

Icona documento 1) Download Document PDF

Icona documento Open access Icona documento Restricted Icona documento Private


Per ulteriori informazioni, contattare: Librarian http://puma.isti.cnr.it

Valid HTML 4.0 Transitional