Trust Management
Traditional, ëclosedí security falls short
- Access Control Lists and user databases operate over a known, finite universe of principals & resources
PolicyMaker introduced a new approach
- Blaze, Feigenbaum, et al. at IEEE Oakland 1996
- A TM engine strings together assertions into proofs
- ...Where assertions can come from many sources
- ...And the crytpography falls out as just one way to entrust the binding of an assertion to a speaker
We need to ask why rather than how