Performance, Computing, and Communications Conference, 2002. 21st IEEE International (2006)
Phoenix, AZ, USA
Apr. 10, 2006 to Apr. 12, 2006
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/.2006.1629416
A. Fritz , Dept. of Comput. Sci., Houston Univ., TX, USA
J.-F. Paris , Dept. of Comput. Sci., Houston Univ., TX, USA
The maille authorization protocol provides flexible and reliable authorization in large distributed and pervasive computing systems. Service owners distribute their access control lists across the network using threshold cryptography. Instances of the distributed service need only verify that requestors have knowledge of a specific secret provided by the Maille authorization system. Requestors use the Maille protocol to find and retrieve individual parts of the scattered key. Once a sufficient quorum of nodes holding the key is found, the requestor can reassemble the key and is authorized. Unlike extant systems, the Maille authorization protocol has no single administrative point of failure and tolerates multiple simultaneous Byzantine failures.
distributed service, Maille authorization protocol, reliability, pervasive computing system, access control, threshold cryptography
A. Fritz and J. Paris, "Maille authorization - a distributed, redundant authorization protocol," Performance, Computing, and Communications Conference, 2002. 21st IEEE International(PCC), Phoenix, AZ, USA, 2006, pp. 38.