Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Blair B. Dillaway is active.

Publication


Featured researches published by Blair B. Dillaway.


ieee international symposium on policies for distributed systems and networks | 2009

Abductive Authorization Credential Gathering

Moritz Y. Becker; Jason F. MacKay; Blair B. Dillaway

A central task in the context of logic-based decentralized authorization languages is that of gathering credentials from credential providers, required by the resource guard’s policy to grant a user’s access request. This paper presents an abduction-based algorithm that computes a specification of missing credentials without communicating with remote credential providers. The specification is used to gather credentials from credential providers in a single pass, without involving any communication with the resource guard. The credentials gathered thus are pushed to the resource guard at authorization time. This approach decouples authorization from credential gathering, and, in comparison to server-side pull methods, reduces the number of messages sent between participants, and allows for environments in which some credential providers are unknown or unavailable to the resource guard at authorization time.


Archive | 2004

A Conceptual Authorization Model for Web Services

Paul J. Leach; Blair B. Dillaway; Praerit Garg; Chris Kaler; Brian A. Lamacchia; Butler W. Lampson; John L. Manferdelli; Rick Rashid; John P. Shewchuk; Daniel R. Simon; Richard B. Ward

This paper describes a conceptual authorization model for Web Services. It is an adaptation of those of Taos [Lamp92] and SDSI [Lamp96] with terms changed to correspond more closely to those introduced with the WS-Security model [WS02]. In contrast to the more formal and mathematical presentation used for Taos and SDSI, this presentation is conceptual and informal, which hopefully may provide more intuition for some readers; it also might provide an outline for the class hierarchy of an object-oriented implementation. In addition, this model abstracts away from issues of distribution and network security such as authentication [Need78] and encryption (for example, by assuming that messages include the unforgeable identity of the sender and are private and tamperproof) so as to focus on authorization, but it does deal with the extensibility and composability of security services, and partial trust. It also


Archive | 1996

System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer

Doug Barlow; Blair B. Dillaway; Barbara L. Fox; Terry M. Lipscomb; Terrence Spies


Archive | 1996

System and method of using smart cards to perform security-critical operations requiring user authorization

Blair B. Dillaway; Douglas C. Barlow; Terry M. Lipscomb


Archive | 2005

Access control policy engine controlling access to resource based on any of multiple received types of security tokens

Blair B. Dillaway; John L. Manferdelli; Shawn M. Woods


Archive | 2007

Securing distributed application information delivery

Blair B. Dillaway


Archive | 2005

Delegating right to access resource or the like in access management system

Blair B. Dillaway; Brian A. Lamacchia; Muthukrishnan Paramasivam; Charles F. Rose; Ravindra Nath Pandya


Archive | 2004

Configuring and managing resources on a multi-purpose integrated circuit card using a personal computer

Doug Barlow; Blair B. Dillaway; Barbara L. Fox; Terry M. Lipscomb; Terrence Spies


Archive | 2003

Attesting to establish trust between computer entities

Blair B. Dillaway; Paul England; Marcus Peinado


Archive | 2003

Revocation of a certificate and exclusion of other principals in a digital rights management (DRM) system based on a revocation list from a delegated revocation authority

Blair B. Dillaway; Philip J. Lafornara; Brian A. Lamacchia; Rushmi U. Malaviarachchi; John L. Manferdelli; Charles F. Rose

Collaboration


Dive into the Blair B. Dillaway's collaboration.

Researchain Logo
Decentralizing Knowledge