Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jason F. MacKay is active.

Publication


Featured researches published by Jason F. MacKay.


ieee international symposium on policies for distributed systems and networks | 2009

Abductive Authorization Credential Gathering

Moritz Y. Becker; Jason F. MacKay; Blair B. Dillaway

A central task in the context of logic-based decentralized authorization languages is that of gathering credentials from credential providers, required by the resource guard’s policy to grant a user’s access request. This paper presents an abduction-based algorithm that computes a specification of missing credentials without communicating with remote credential providers. The specification is used to gather credentials from credential providers in a single pass, without involving any communication with the resource guard. The credentials gathered thus are pushed to the resource guard at authorization time. This approach decouples authorization from credential gathering, and, in comparison to server-side pull methods, reduces the number of messages sent between participants, and allows for environments in which some credential providers are unknown or unavailable to the resource guard at authorization time.


rules and rule markup languages for the semantic web | 2011

Relaxed safeness in Datalog-based policies

Moritz Y. Becker; Jason F. MacKay

This paper presents a safeness condition that is more liberal than the one commonly imposed on Datalog, based on classifying predicate arguments into input and output arguments, thereby extending the expressiveness of Datalog-based policy languages. It is also shown that the relaxed safeness condition is a powerful tool for adding important features to such languages.


Archive | 2004

Method and system for downloading updates

Jason F. MacKay


Archive | 2010

ANONYMOUS PRINCIPALS FOR POLICY LANGUAGES

Mira Belinkiy; Tolga Acar; Thomas Roeder; Jason F. MacKay; Brian A. Lamacchia


Archive | 2007

Delegation in logic-based access control

Moritz Y. Becker; Blair B. Dillaway; Gregory Darrell Fee; John M. Leen; Jason F. MacKay


Archive | 2009

CREDENTIAL GATHERING WITH DEFERRED INSTANTIATION

Moritz Y. Becker; Jason F. MacKay


Archive | 2008

Access policy analysis

Moritz Y. Becker; Blair B. Dillaway; Gregory Darrell Fee; Jason F. MacKay; Jason Hogg; John M. Leen


Archive | 2006

Security language translations with logic resolution

Moritz Y. Becker; Blair B. Dillaway; Cédric Fournet; Andrew D. Gordon; Jason F. MacKay


Archive | 2007

ABDUCING ASSERTION TO SUPPORT ACCESS QUERY

Moritz Y. Becker; Jason F. MacKay


Archive | 2009

An Abductive Protocol for Authorization Credential Gathering in Distributed Systems

Moritz Y. Becker; Jason F. MacKay; Blair B. Dillaway

Collaboration


Dive into the Jason F. MacKay's collaboration.

Researchain Logo
Decentralizing Knowledge