The Community for Technology Leaders
2006 IEEE International Performance Computing and Communications Conference (2006)
Phoenix, AZ, USA
Apr. 10, 2006 to Apr. 12, 2006
ISBN: 1-4244-0198-4
pp: 38
A. Fritz , Dept. of Comput. Sci., Houston Univ., TX, USA
J.-F. Paris , Dept. of Comput. Sci., Houston Univ., TX, USA
ABSTRACT
The maille authorization protocol provides flexible and reliable authorization in large distributed and pervasive computing systems. Service owners distribute their access control lists across the network using threshold cryptography. Instances of the distributed service need only verify that requestors have knowledge of a specific secret provided by the Maille authorization system. Requestors use the Maille protocol to find and retrieve individual parts of the scattered key. Once a sufficient quorum of nodes holding the key is found, the requestor can reassemble the key and is authorized. Unlike extant systems, the Maille authorization protocol has no single administrative point of failure and tolerates multiple simultaneous Byzantine failures.
INDEX TERMS
distributed service, Maille authorization protocol, reliability, pervasive computing system, access control, threshold cryptography
CITATION

A. Fritz and J. Paris, "Maille authorization - a distributed, redundant authorization protocol," 2006 IEEE International Performance Computing and Communications Conference(PCC), Phoenix, AZ, USA, 2006, pp. 38.
doi:10.1109/.2006.1629416
79 ms
(Ver 3.3 (11022016))