Binding bit patterns to real world entities

B. Christianson, J. Malcolm

Research output: Contribution to journalArticlepeer-review

4 Citations (Scopus)
26 Downloads (Pure)

Abstract

Public key cryptography is often used to verify the integrity of a piece of data, or more generally to ensure that operations which modify the data have been requested and carried out by principals who are authorized to do so. This requires keys to be bound to principals in an unforgetably verifiable manner. Cryptographic bit patterns such as electronic key certificates (EKCs) have a part to play in establishing such bindings, but the requirement ultimately to bind keys to real world entities imposes subtle constraints upon the structure and semantics of EKCs and related entities such as ACLs and capabilities, and upon the role which such entities may play in access control and integrity verification. These do not appear to be adequately realized at present.
Original languageEnglish
Pages (from-to)105-113
JournalLecture Notes in Computer Science (LNCS)
Volume1361
DOIs
Publication statusPublished - 1998

Fingerprint

Dive into the research topics of 'Binding bit patterns to real world entities'. Together they form a unique fingerprint.

Cite this