Blair B. Dillaway
Microsoft
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Blair B. Dillaway.
ieee international symposium on policies for distributed systems and networks | 2009
Moritz Y. Becker; Jason F. MacKay; Blair B. Dillaway
A central task in the context of logic-based decentralized authorization languages is that of gathering credentials from credential providers, required by the resource guard’s policy to grant a user’s access request. This paper presents an abduction-based algorithm that computes a specification of missing credentials without communicating with remote credential providers. The specification is used to gather credentials from credential providers in a single pass, without involving any communication with the resource guard. The credentials gathered thus are pushed to the resource guard at authorization time. This approach decouples authorization from credential gathering, and, in comparison to server-side pull methods, reduces the number of messages sent between participants, and allows for environments in which some credential providers are unknown or unavailable to the resource guard at authorization time.
Archive | 2004
Paul J. Leach; Blair B. Dillaway; Praerit Garg; Chris Kaler; Brian A. Lamacchia; Butler W. Lampson; John L. Manferdelli; Rick Rashid; John P. Shewchuk; Daniel R. Simon; Richard B. Ward
This paper describes a conceptual authorization model for Web Services. It is an adaptation of those of Taos [Lamp92] and SDSI [Lamp96] with terms changed to correspond more closely to those introduced with the WS-Security model [WS02]. In contrast to the more formal and mathematical presentation used for Taos and SDSI, this presentation is conceptual and informal, which hopefully may provide more intuition for some readers; it also might provide an outline for the class hierarchy of an object-oriented implementation. In addition, this model abstracts away from issues of distribution and network security such as authentication [Need78] and encryption (for example, by assuming that messages include the unforgeable identity of the sender and are private and tamperproof) so as to focus on authorization, but it does deal with the extensibility and composability of security services, and partial trust. It also
Archive | 1996
Doug Barlow; Blair B. Dillaway; Barbara L. Fox; Terry M. Lipscomb; Terrence Spies
Archive | 1996
Blair B. Dillaway; Douglas C. Barlow; Terry M. Lipscomb
Archive | 2005
Blair B. Dillaway; John L. Manferdelli; Shawn M. Woods
Archive | 2007
Blair B. Dillaway
Archive | 2005
Blair B. Dillaway; Brian A. Lamacchia; Muthukrishnan Paramasivam; Charles F. Rose; Ravindra Nath Pandya
Archive | 2004
Doug Barlow; Blair B. Dillaway; Barbara L. Fox; Terry M. Lipscomb; Terrence Spies
Archive | 2003
Blair B. Dillaway; Paul England; Marcus Peinado
Archive | 2003
Blair B. Dillaway; Philip J. Lafornara; Brian A. Lamacchia; Rushmi U. Malaviarachchi; John L. Manferdelli; Charles F. Rose