Information flow in trust management systems
نویسنده
چکیده
This article proposes a systematic study of information flow in credential-based declarative authorization policies. It argues that a treatment in terms of information flow is needed to adequately describe, analyze and mitigate a class of probing attacks which allow an adversary to infer any confidential fact within a policy. Two information flow properties that have been studied in the context of state transition systems, non-interference and opacity, are reformulated in the current context of policy languages. A comparison between these properties reveals that opacity is the more useful, and more general of the two; indeed, it is shown that non-interference can be stated in terms of opacity. The article then presents an inference system for non-opacity, or detectability, in Datalog-based policies. Finally, a pragmatic method is presented, based on a mild modification of the mechanics of delegation, for preventing a particularly dangerous kind of probing attack that abuses delegation of authority.
منابع مشابه
DisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems
The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...
متن کاملKnowledge Flows Automation and Designing a Knowledge Management Framework for Educational Organizations
One of an important factor in the success of organizations is the efficiency of knowledge flow. The knowledge flow is a comprehensive concept and in recent studies of organizational analysis broadly considered in the areas of strategic management, organizational analysis and economics. In this paper, we consider knowledge flows from an Information Technology (IT) viewpoint. We usually have tw...
متن کاملP2P Network Trust Management Survey
Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...
متن کاملDisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems
The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...
متن کاملIntroducing a mathematical model in supply chain with adding trust flow
These day, supply chains (SCs) have become more and more complicated and have extensively expanded and due to these complexities, the supply chain management (SCM) has encountered several uncertainties, and, as a result, trust and assurance between members in SCs has become essential for a successful SCM. Although trust is an inevitable component in nearly all fields in SCs, like cooperation, c...
متن کاملRebuilding Confidence: Trust, Control and Information Technology in Humanitarian Supply Chains
Donors have expressed disappointment in the performance of humanitarian organizations in responding to recent unprecedented disasters. Efforts to restore confidence have focused in part on improving transparency, accountability and capability through implementation of supply chain management information systems. This paper explores issues of trust, control and confidence in partner cooperation ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Journal of Computer Security
دوره 20 شماره
صفحات -
تاریخ انتشار 2012