The Community for Technology Leaders
Performance, Computing, and Communications Conference, 2002. 21st IEEE International (2006)
Phoenix, AZ, USA
Apr. 10, 2006 to Apr. 12, 2006
ISBN: 1-4244-0198-4
pp: 38
A. Fritz , Dept. of Comput. Sci., Houston Univ., TX, USA
J.-F. Paris , Dept. of Comput. Sci., Houston Univ., TX, USA
ABSTRACT
The maille authorization protocol provides flexible and reliable authorization in large distributed and pervasive computing systems. Service owners distribute their access control lists across the network using threshold cryptography. Instances of the distributed service need only verify that requestors have knowledge of a specific secret provided by the Maille authorization system. Requestors use the Maille protocol to find and retrieve individual parts of the scattered key. Once a sufficient quorum of nodes holding the key is found, the requestor can reassemble the key and is authorized. Unlike extant systems, the Maille authorization protocol has no single administrative point of failure and tolerates multiple simultaneous Byzantine failures.
INDEX TERMS
distributed service, Maille authorization protocol, reliability, pervasive computing system, access control, threshold cryptography
CITATION
A. Fritz, J.-F. Paris, "Maille authorization - a distributed, redundant authorization protocol", Performance, Computing, and Communications Conference, 2002. 21st IEEE International, vol. 00, no. , pp. 38, 2006, doi:10.1109/.2006.1629416
87 ms
(Ver 3.3 (11022016))