Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jason E. Holt is active.

Publication


Featured researches published by Jason E. Holt.


workshop on privacy in the electronic society | 2003

Hidden Credentials

Jason E. Holt; Robert W. Bradshaw; Kent E. Seamons; Hilarie Orman

Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend on fulfillment of policies described by monotonic boolean formulae can take place in a single round of messages. We further show how credentials that are never revealed can be used to retrieve sensitive resources.


computer and communications security | 2004

Concealing complex policies with hidden credentials

Robert W. Bradshaw; Jason E. Holt; Kent E. Seamons

Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing hidden credentials using Boneh/Franklin Identity Based Encryption. We also propose a substantially improved secret splitting scheme for enforcing complex policies, and show how it improves concealment of policies from nonsatisfying recipients.


ACM Transactions on Information and System Security | 2004

Content-triggered trust negotiation

Adam Hess; Jason E. Holt; Jared Jacobson; Kent E. Seamons

The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resources. The set of resources is usually static, and an access control policy associated with each resource specifies who is authorized to access the resource. In this article, we turn the traditional client/server access control model on its head and address how to protect the sensitive content that clients disclose to and receive from servers. Since client content is often dynamically generated at run-time, the usual approach of associating a policy with the resource (content) a priori does not work. We propose a general-purpose access control model designed to detect whenever sensitive information is being transmitted, and determine whether the sender or receiver is authorized. The model identifies sensitive content, maps the sensitive content to an access control policy, and establishes the trustworthiness of the sender or receiver before the sensitive content is disclosed or received. We have implemented the model within TrustBuilder, an architecture for negotiating trust between strangers based on properties other than identity. The implementation targets open systems, where clients and servers do not have preexisting trust relationships. The implementation is the first example of content-triggered trust negotiation. It currently supports access control for sensitive content disclosed by web and email clients.


darpa information survivability conference and exposition | 2003

TrustBuilder: negotiating trust in dynamic coalitions

Kent E. Seamons; Thomas Chan; Evan Child; Michael Halcrow; Adam Hess; Jason E. Holt; Jared Jacobson; Ryan Jarvis; Aaron Patty; Bryan Smith; Tore Sundelin; Lina Yu

Automated trust negotiation is an approach to establishing trust across security domains in a dynamic coalition in real time. This is accomplished through the use of access control policies that specify what combinations of digital credentials a stranger must disclose to gain access to a coalition resource. TrustBuilder, a system for negotiating trust in dynamic coalitions, is being designed and implemented in the Internet Security Research Laboratory at Brigham Young University. The TrustBuilder architecture incorporates trust negotiation into standard network technologies. This paper describes the technology in the current TrustBuilder prototype.


darpa information survivability conference and exposition | 2003

Trust Negotiation in Dynamic Coalitions

Kent E. Seamons; Marianne Winslett; Ting Yu; Thomas Chan; Evan Child; Michael Halcrow; Adam Hess; Jason E. Holt; Jared Jacobson; Ryan Jarvis; Bryan Smith; Tore Sundelin; Lina Yu

Military and business partners may need to conduct sensitive interactions on line, requiring members in a coalition to share sensitive resources with those outside their local security domain. Automated trust negotiation is an approach that accomplishes this, through the use of access control policies that specify what combinations of digital credentials a stranger must disclose to gain access to a coalition resource. The Trust Negotiation in Dynamic Coalitions project has focused on the theoretical underpinnings of trust negotiation as well as the design and implementation of TrustBuilder, an architecture that incorporates trust negotiation into standard network technologies. This paper summarizes the research contributions of this project to trust negotiation in the areas of sensitive access control policies, strategies, protocols, policy language requirements, and privacy protection. This paper also describes the basic design of TrustBuilder.


ieee symposium on security and privacy | 2003

Two Security Symposia

Ting Yu; Marianne Winslett; Jason E. Holt

Attendees report onthe IEEE Symposium on Security and Privacy and the Almaden Institute Symposium on Privacy. Speakers from various affiliations discussed everything from mechanical locks to privacy policies.


grid computing | 2006

Logcrypt: forward security and public verification for secure audit logs

Jason E. Holt


IACR Cryptology ePrint Archive | 2002

Selective disclosure credential sets.

Jason E. Holt; Kent E. Seamons


IACR Cryptology ePrint Archive | 2006

Key Privacy for Identity Based Encryption.

Jason E. Holt


IACR Cryptology ePrint Archive | 2005

Reconciling CA-Oblivious Encryption, Hidden Credentials, OSBE and Secret Handshakes.

Jason E. Holt

Collaboration


Dive into the Jason E. Holt's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Adam Hess

Brigham Young University

View shared research outputs
Top Co-Authors

Avatar

Jared Jacobson

Brigham Young University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Bryan Smith

Brigham Young University

View shared research outputs
Top Co-Authors

Avatar

Evan Child

Brigham Young University

View shared research outputs
Top Co-Authors

Avatar

Lina Yu

Brigham Young University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ryan Jarvis

Brigham Young University

View shared research outputs
Top Co-Authors

Avatar

Thomas Chan

Brigham Young University

View shared research outputs
Researchain Logo
Decentralizing Knowledge