Abstract
We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then, we address the fact that not all participants in a trust-management system can be trusted to assist in such monitoring, and show how many integrity constraints can be monitored in a conservative manner so that trusted participants detect and report if the system enters a policy state from which evolution in unmonitored portions of the policy could lead to a constraint violation.
Supplemental Material
Available for Download
Online appendix to maintaining control while delegating trust: Integrity constraints in trust management. The appendix supports the information on article 5.
- Apt, K. R. 1997. From Logic Programming to Prolog. Prentice Hall, Upper Saddle River, NJ. Google Scholar
Digital Library
- Blaze, M., Feigenbaum, J., Ioannidis, J., and Keromytis, A. 1999a. The KeyNote trust management system, version 2. IETF RFC 2704.Google Scholar
- Blaze, M., Feigenbaum, J., Ioannidis, J., and Keromytis, A. 1999b. The role of trust management in distributed systems security. In Secure Internet Programming: Security Issues for Mobile and Distributed Objects, J. Vitek and C. Jensen, Eds. Springer-Verlag, Berlin, 185--210. Google Scholar
Digital Library
- Blaze, M., Feigenbaum, J., and Lacy, J. 1996. Decentralized trust management. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, Los Alamitos, CA, 164--173. Google Scholar
Digital Library
- Clarke, D., Elien, J.-E., Ellison, C., Fredette, M., Morcos, A., and Rivest, R. 2001. Certificate chain discovery in SPKI/SDSI. J. Comput. Secur. 9, 4, 285--322. Google Scholar
Digital Library
- Dowling, W. F. and Gallier, J. H. 1984. Linear-time algorithms for testing the satisfiability of propositional horn formulae. J. Logic Program. 1, 3, 267--284.Google Scholar
Cross Ref
- Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., and Ylonen, T. 1999. SPKI certificate theory. IETF RFC 2693.Google Scholar
- Etalle, S. and Winsborough, W. H. 2005. Integrity constraints in trust management--extended abstract. In Proceedings of the 10th ACM Symposium on Access Control Models and Technologies (SACMAT'05). ACM, New York, 1--10. Google Scholar
Digital Library
- Godfrey, P., Grant, J., Gryz, J., and Minker, J. 1998. Integrity constraints: Semantics and applications. In Logics for Databases and Information Systems, J. Chomicki and G. Saake, Eds. Kluwer Academic, The Netherlands, 265--306. Google Scholar
Digital Library
- Gofman, M., Luo, R., Solomon, A., Zhang, Y., Yang, P., and Stoller, S. 2009. Rbac-pat: A policy analysis tool for role based access control. In Proceedings of the 15th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'09). Springer-Verlag, Berlin. Google Scholar
Digital Library
- Gunter, C. and Jim, T. 2000. Policy-directed certificate retrieval. Softw. Pract. Exp. 30, 15, 1609--1640. Google Scholar
Digital Library
- Harrison, M., Ruzzo, W., and Ullman, J. 1976. Protection in operating systems. Comm. ACM 19, 8, 461--471. Google Scholar
Digital Library
- Jajodia, S. and Sandhu, R. 1991. Toward a multilevel secure relational data model. In Proceedings of the ACM International SIGMOD Conference on Management of Data. ACM, New York, 50--59. Google Scholar
Digital Library
- Jim, T. 2001. SD3: A trust management system with certified evaluation. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, Los Alamitos, CA, 106--115. Google Scholar
Digital Library
- Kowalski, R., Sadri, F., and Soper, P. 1987. Integrity checking in deductive databases. In Proceedings of 13th International Conference on Very Large Databases (VLDB'97). Morgan Kaufmann, San Francisco, CA, 61--69. Google Scholar
Digital Library
- Li, N., Grosof, B., and Feigenbaum, J. 2003. Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur. 6, 1, 128--171. Google Scholar
Digital Library
- Li, N., Mitchell, J., and Winsborough, W. 2002. Design of a role-based trust management framework. In Proceedings of the IEEE Symposium on Research in Security and Privacy. IEEE, Los Alamitos, CA, 114--130. Google Scholar
Digital Library
- Li, N. and Mitchell, J. C. 2003. Datalog with constraints: A foundation for trust management languages. In Proceedings of the 5th International Symposium on Practical Aspects of Declarative Languages (PADL'03). Springer-Verlag, Berlin, 58--73. Google Scholar
Digital Library
- Li, N., Mitchell, J. C., and Winsborough, W. H. 2005. Beyond proof-of-compliance: Security analysis in trust management. J. ACM 52, 3, 474--514. Google Scholar
Digital Library
- Li, N. and Tripunitara, M. V. 2006. Security analysis in role-based access control. ACM Trans. Inf. Syst. Secur. 9, 4, 391--420. Google Scholar
Digital Library
- Li, N., Winsborough, W., and Mitchell, J. 2003. Distributed credential chain discovery in trust management. J. Comput. Secur. 11, 1, 35--86. Google Scholar
Digital Library
- Lloyd, J. W., Sonenberg, L., and Topor, R. W. 1987. Integrity constraint checking in stratified databases. J. Logic Program. 4, 4, 331--343. Google Scholar
Digital Library
- Lloyd, J. W. and Topor, R. W. 1985. A basis for deductive database systems. J. Logic Program. 2, 2, 93--109.Google Scholar
Cross Ref
- Lloyd, J. W. and Topor, R. W. 1986. A basis for deductive database systems ii. J. Logic Program. 3, 1, 55--67. Google Scholar
Digital Library
- Olivé, A. 1991. Integrity constraints checking in deductive databases. In Proceedings of the 17th International Conference on Very Large Databases (VLDB'91). Morgan Kaufmann, San Francisco, CA, 513--523. Google Scholar
Digital Library
- Reith, M., Niu, J., and Winsborough, W. H. 2009. Towards practical analysis for trust management policy. In Proceedings of the ACM Symposium on Information, Computer and Communication Security (ASIACCS'09). ACM, New York. Google Scholar
Digital Library
- Rivest, R. and Lampson, B. 1996. SDSI—a simple distributed security infrastructure. http://theory.lcs.mit.edu/_rivest/sdsi11.html.Google Scholar
- Sandhu, R., Bhamidipati, V., and Munawer, Q. 1999. The arbac97 model for role-based administration of roles. ACM Trans. Inf. Syst. Secur. 2, 1, 105--135. Google Scholar
Digital Library
- Sandhu, R., Coyne, E., Feinstein, H., and Youman, C. 1996. Role-based access control models. IEEE Comput. 29, 2, 38--47. Google Scholar
Digital Library
- Sasturkar, A., Yang, P., Stoller, S. D., and Ramakrishnan, C. R. 2006. Policy analysis for administrative role based access control. In Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW'06). IEEE, Los Alamitos, CA, 124--138. Google Scholar
Digital Library
- Sistla, A. P. and Zhou, M. 2008. Analysis of dynamic policies. Inf. Comput. 206, 2--4, 185--212. Google Scholar
Digital Library
- Stoller, S., Yang, P., Ramakrishnan, C. R., and Gofman, M. 2007. Efficient policy analysis for administrative role based access control. In Proceedings of the ACM Conference on Computer and Communication Security (CCS'07). ACM, New York, 445--455. Google Scholar
Digital Library
- Weeks, S. 2001. Understanding trust management systems. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, Los Alamitos, CA, 94--105. Google Scholar
Digital Library
Index Terms
Maintaining control while delegating trust: Integrity constraints in trust management
Recommendations
Integrity constraints in trust management
SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologiesWe introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then we address ...
Design of a Role-Based Trust-Management Framework
SP '02: Proceedings of the 2002 IEEE Symposium on Security and PrivacyWe introduce the RT framework, a family of Role-based Trust-managementlanguages for representing policies and credentials in distributedauthorization. RT combines the strengths of role-based access controland trust-management systems and is especially ...
Delegation logic: A logic-based approach to distributed authorization
We address the problem of authorization in large-scale, open, distributed systems. Authorization decisions are needed in electronic commerce, mobile-code execution, remote resource sharing, privacy protection, and many other applications. We adopt the ...






Comments