Access control on the Web using proof-carrying authorization
Source: DOI Authors: L. Bauer, M.A. Schneider, E.W. Felten, A.W. Appel Date: 2004
Core idea
A requester can carry machine-checkable proof that an action satisfies the receiver’s local policy, allowing authorization decisions to rest on evidence rather than on opaque trust.
Key claims
- Authorization can be transmitted as a proof object attached to a request.
- The verifier remains sovereign because it checks the proof against its own policy.
- Credentials become useful when they compose into explicit evidence of permission.
Harness takeaway
Sensitive cross-node actions in a harness should prefer evidence-carrying requests: “here is why I may do this” is better than “trust me, my reputation says I’m fine.”