메뉴 건너뛰기




Volumn , Issue , 2014, Pages

Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; NETWORK SECURITY;

EID: 85180628981     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss/2014.23212     Document Type: Conference Paper
Times cited : (65)

References (54)
  • 5
    • 85180621642 scopus 로고    scopus 로고
    • Amazon Inc., “Example cases for Amazon S3 Bucket Policies,” 2013, http://docs.aws.amazon.com/AmazonS3/latest/dev/AccessPolicyLanguage_UseCases_s3_a.html.
    • (2013) Example cases for Amazon S3 Bucket Policies
  • 7
    • 84914104881 scopus 로고    scopus 로고
    • Transport layer security (TLS) Channel IDs
    • D. Balfanz and R. Hamilton, “Transport layer security (TLS) Channel IDs,” IETF Draft, 2013, http://tools.ietf.org/html/draft-balfanz-tlschannelid.
    • (2013) IETF Draft
    • Balfanz, D.1    Hamilton, R.2
  • 9
    • 77954754889 scopus 로고    scopus 로고
    • SecPAL: Design and semantics of a decentralized authorization language
    • M. Y. Becker, C. Fournet, and A. D. Gordon, “SecPAL: Design and semantics of a decentralized authorization language,” Journal of Computer Security, vol. 18, no. 4, 2010.
    • (2010) Journal of Computer Security , vol.18 , Issue.4
    • Becker, M. Y.1    Fournet, C.2    Gordon, A. D.3
  • 10
    • 68249091950 scopus 로고    scopus 로고
    • Automatic verification of correspondences for security protocols
    • B. Blanchet, “Automatic verification of correspondences for security protocols,” Journal of Computer Security, vol. 17, no. 4, 2009.
    • (2009) Journal of Computer Security , vol.17 , Issue.4
    • Blanchet, B.1
  • 13
    • 85180637217 scopus 로고    scopus 로고
    • The OAuth 2.0 authorization framework: Holder-of-the-key token usage
    • J. Bradley, P. Hunt, T. Nadalin, and H. Tschofenig, “The OAuth 2.0 authorization framework: Holder-of-the-key token usage,” IETF Draft, http://tools.ietf.org/html/draft-tschofenig-oauth-hotk.
    • IETF Draft
    • Bradley, J.1    Hunt, P.2    Nadalin, T.3    Tschofenig, H.4
  • 15
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • D. D. Clark and D. R. Wilson, “A comparison of commercial and military computer security policies.” in IEEE Symp. on Security & Privacy, 1987.
    • (1987) IEEE Symp. on Security & Privacy
    • Clark, D. D.1    Wilson, D. R.2
  • 17
    • 84895539842 scopus 로고    scopus 로고
    • The OAuth 2.0 Authorization Framework
    • E. D. Hardt, “The OAuth 2.0 Authorization Framework,” IETF RFC 6749 (Informational), 2012, http://tools.ietf.org/html/rfc6749.
    • (2012) IETF RFC 6749 (Informational)
    • Hardt, E. D.1
  • 18
    • 0025508369 scopus 로고
    • Network security via private-key certificates
    • D. Davis and R. R. Swick, “Network security via private-key certificates,” Operating Systems Review, vol. 24, no. 4, 1990.
    • (1990) Operating Systems Review , vol.24 , Issue.4
    • Davis, D.1    Swick, R. R.2
  • 20
    • 70450184286 scopus 로고    scopus 로고
    • The Transport Layer Security (TLS) Protocol
    • T. Dierks and E. Rescola, “The Transport Layer Security (TLS) Protocol,” IETF RFC 5246 (Standards track), 2008, http://www.ietf.org/rfc/rfc5246.txt.
    • (2008) IETF RFC 5246 (Standards track)
    • Dierks, T.1    Rescola, E.2
  • 21
    • 84940397122 scopus 로고    scopus 로고
    • Origin-bound certificates: A fresh approach to strong client authentication for the web
    • M. Dietz, A. Czeskis, D. Balfanz, and D. S. Wallach, “Origin-bound certificates: A fresh approach to strong client authentication for the web,” in Proc. USENIX Security, 2012.
    • (2012) Proc. USENIX Security
    • Dietz, M.1    Czeskis, A.2    Balfanz, D.3    Wallach, D. S.4
  • 24
    • 0024984237 scopus 로고
    • An architecture for practical delegation in a distributed system
    • M. Gasser and E. McDermott, “An architecture for practical delegation in a distributed system,” in IEEE Symp. on Security & Privacy, 1990.
    • (1990) IEEE Symp. on Security & Privacy
    • Gasser, M.1    McDermott, E.2
  • 27
    • 85180620688 scopus 로고    scopus 로고
    • Google Inc., “Belay research project,” 2012, https://code.google.com/p/google-belay/.
    • (2012) Belay research project
  • 28
    • 85180632343 scopus 로고    scopus 로고
    • Google Inc., “YouTube video privacy settings,” 2013, http://support.google.com/youtube/bin/answer.py?hl=en&answer=157177.
    • (2013) YouTube video privacy settings
  • 30
    • 85180626539 scopus 로고    scopus 로고
    • Web Services Security: SAML Token Profile
    • P. Hallam-Baker, C. Kaler, R. Monzillo, and A. Nadalin, “Web Services Security: SAML Token Profile,” OASIS, 2004, http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0.pdf.
    • (2004) OASIS
    • Hallam-Baker, P.1    Kaler, C.2    Monzillo, R.3    Nadalin, A.4
  • 31
    • 85180632593 scopus 로고    scopus 로고
    • HTTP authentication: MAC access authentication
    • E. Hammer-Lahav, A. Barth, and B. Adida, “HTTP authentication: MAC access authentication,” IETF Draft, http://tools.ietf.org/html/draft-hammer-oauth-v2-mac-token.
    • IETF Draft
    • Hammer-Lahav, E.1    Barth, A.2    Adida, B.3
  • 38
    • 33646242539 scopus 로고    scopus 로고
    • Understanding SPKI/SDSI using first-order logic
    • N. Li and C. Mitchell, “Understanding SPKI/SDSI using first-order logic,” Intl. Journal of Inf. Security, vol. 5, no. 1, 2006.
    • (2006) Intl. Journal of Inf. Security , vol.5 , Issue.1
    • Li, N.1    Mitchell, C.2
  • 41
    • 85180629528 scopus 로고    scopus 로고
    • Mozilla, “BrowserID specification,” https://github.com/mozilla/id-specs/blob/prod/browserid/index.md.
    • BrowserID specification
  • 42
    • 0013091373 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, [Online]. Available
    • National Institute of Standards and Technology, “FIPS PUB 198-1: The keyed-hash message authentication code (HMAC),” 2008. [Online]. Available: http://csrc.nist.gov/publications/fips/fips198-1/FIPS198-1_final.pdf
    • (2008) FIPS PUB 198-1: The keyed-hash message authentication code (HMAC)
  • 43
    • 0027316628 scopus 로고
    • Proxy-based authorization and accounting for distributed systems
    • B. C. Neuman, “Proxy-based authorization and accounting for distributed systems,” in Conf. on Distributed Computing Systems, 1993.
    • (1993) Conf. on Distributed Computing Systems
    • Neuman, B. C.1
  • 46
    • 19944381369 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure (PKI) proxy certificate profile
    • [Online]. Available
    • E. S. Tuecke, “Internet X.509 public key infrastructure (PKI) proxy certificate profile,” IETF RFC 3820 (Standards track), 2004. [Online]. Available: http://www.ietf.org/rfc/rfc3820.txt
    • (2004) IETF RFC 3820 (Standards track)
    • Tuecke, E. S.1
  • 49
    • 84869401890 scopus 로고    scopus 로고
    • The Devil is in the (Implementation) Details: An Empirical Analysis of OAuth SSO Systems
    • S.-T. Sun and K. Beznosov, “The Devil is in the (Implementation) Details: An Empirical Analysis of OAuth SSO Systems,” in ACM Computer and Communications Security (CCS)), 2012.
    • (2012) ACM Computer and Communications Security (CCS))
    • Sun, S.-T.1    Beznosov, K.2
  • 54
    • 85180631018 scopus 로고    scopus 로고
    • ZDNet: Between the Lines, “Dropbox adds Facebook sharing,” 2012, http://www.zdnet.com/facebook-gets-involved-with-cloud-storage-viadropbox-integration-7000004861/.
    • (2012) Dropbox adds Facebook sharing


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.