scispace - formally typeset
Search or ask a question

Showing papers on "Revocation published in 1991"


Journal ArticleDOI
TL;DR: In this article, three primary characteristics of penalties, if appropriately perceived, have the potential to reduce drunk driving: certainty, swift applied, and severe, are identified as among the most effective deterrents.

105 citations



Journal ArticleDOI
TL;DR: The author argues for administrative license revocation laws for drunk drivers, instead of criminal sentencing, because drivers who keep their licenses but undergo education and therapy programs have fewer subsequent crashes and violations.
Abstract: The author argues for administrative license revocation laws for drunk drivers, instead of criminal sentencing. A typical license may be taken for 90 days, with longer periods of revocation if a person suspected of drunk driving refuses a breath test. The driving public has been shown to view license revocation as a serious punishment. Compared with drivers who keep their licenses but undergo education and therapy programs, drivers losing licenses have fewer subsequent crashes and violations.

5 citations



Book ChapterDOI
01 Jan 1991
TL;DR: A new scheme for managing capabilities in a distributed system that incorporates novel solutions to both communication and revocation, and exploits recent developments in “zero-knowledge” authentication protocols.
Abstract: Capabilities are well-known to be a simple and efficient technique for implementing protection in centralized systems. In decentralized distributed systems, however, implementing capabilities can be considerably more difficult. Two problems stand out: (1) how to communicate information about capabilities across an insecure communication network, and (2) how to revoke capabilities in the presence of failures such as message delays, crashes, and network partitions. This paper describes a new scheme for managing capabilities in a distributed system that incorporates novel solutions to both problems. The communication problem is addressed by a new and efficient protocol that exploits recent developments in “zero-knowledge” authentication protocols. The revocation problem is solved by new protocols that rely on approximately synchronized real-time clocks to create the illusion that revocation occurs instantaneously, even in the presence of failures.

2 citations


01 Jan 1991
TL;DR: In this article, a study of the costs and benefits associated with the implementation of laws calling for the administrative suspension of driver licenses for driving while intoxicated (DWI) is presented, which generally call for speedy license suspension or revocation for persons arrested for DWI who are at illegal breath alcohol concentrations.
Abstract: This report summarizes a study of the costs and benefits associated with the implementation of laws calling for the administrative suspension of driver licenses for driving while intoxicated (DWI). Such laws generally call for speedy license suspension or revocation for persons arrested for DWI who are at illegal breath alcohol concentrations. The experience of three states was studied. They were Nevada, Mississippi and Illinois. Costs associated with implementation of administrative suspension or revocation laws were identified as well as additional revenues to the states attributable to the law in the form of license reinstatement fees. Transfer payments from the Federal Government for which the states qualified through implementation of administrative revocation for DWI were also identified as were societal benefits as indicated by reduced crash costs. In each state license reinstatement fees more than offset costs associated with implementing the law and reductions in crash costs were well over 100 times the cost of implementation. The major study recommendation is that other states give serious consideration to administrative license suspension for DWI.

1 citations


01 Jan 1991
TL;DR: This paper looks at the problem of delegation of rights, or proxy in distributed object systems, and presents two signature-bssed schemes to achieve delegation which require different inter-object trust assumptions.
Abstract: This paper looks at the problem of delegation of rights, or proxy in distributed object systems. We present two signature-bssed schemes to achieve delegation which require different inter-object trust assumptions. These schemes have been instantiated using public key and secret key based cryptographic techniques. We also consider additional trust implications which arise from these implementations. Then we consider the issue of revocation of delegations and propose several ways of achieving this. These solutions have been compared with the mechanism proposed in the Distributed System Security Architecture described in [1]. Finally, to conclude the paper, we consider the Kerberos authentication system and propose extensions to implement the delegation scheme. 1 Summary Access control is the establishment and mariagement of which users may access which objects in a system. Users which may access certain objects are said to have rights, or privileges. In this paper we consider the delegation of rights, whereby some objects may be authorised to act on behalf of other objects. First, we look at what is involved in delegation.