Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems

نویسندگان

  • Changyu Dong
  • Giovanni
  • Naranker Dulay
چکیده

Trust management systems provide a flexible way for performing decentralized security management. However, most trust management systems only support monotonic policies. Compared with nonmonotonic policies, monotonic ones are less flexible and cannot express policies such as “Chinese wall policies” and “separation of duties”. To support non-monotonic policies, trust management systems must be able to correctly identify the credentials which a subject has that are required by the policies. Previous efforts address the problem by letting the system query the issuers directly to verify the possession status of the credentials. But this approach can violate the subject’s privacy. The main contribution of this paper is a cryptographic credential verification scheme for non-monotonic trust management systems that can correctly identify the credentials that a subject has while also protecting the subject’s privacy. We also analyze the security of the scheme and prove that with correct construction and certain cryptographic assumptions, the scheme

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Privacy Preserving Enhanced Trust Building Mechanism for Web Services

With the development of web services, more effective trust building mechanisms are needed to deploy diverse trust models in a web services environment. The lack of mechanisms that can dynamically build trust relationships while preserving privacy impedes progress. Current web service technologies encourage a client to reveal all its private attributes in a pre-packaged digital credential to the...

متن کامل

Ordered Semiring-based Trust Establish Model with Risk Protecting

Trust management systems support the provision of the required levels of assurance in a flexible and scalable manner by locally discriminating between the entities with which a principal should interact. However, there is a tension between the preservation of privacy and the controlled release of information when an entity submits credentials for establishing and verifying trust. Furthermore, t...

متن کامل

Client-Side Biometric Verification Based on Trusted Computing

Traditionally, a user requires substantial trust in a workstation for correctly handling her credentials (e.g. password/login). Unfortunately, malware and compromised software makes them unsuitable for secure credential management. Credentials are easily stolen and the user cannot trust what is being displayed on her workstation, obstructing informed consent. This paper presents a new solution ...

متن کامل

Ordered Semiring-based Trust Establish Model with Risk Evaluating

Distributed trust management supports the provision of the required levels in a flexible and scalable manner by locally discriminating between the entities with which a principal should interact. However, there is a tension between the preservation of privacy and the controlled release of information when an entity submits credentials for establishing and verifying trust metric where it may dis...

متن کامل

Shinren: Non-monotonic Trust Management for Distributed Systems

The open and dynamic nature of modern distributed systems and pervasive environments presents significant challenges to security management. One solution may be trust management which utilises the notion of trust in order to specify and interpret security policies and make decisions on security-related actions. Most trust management systems assume monotonicity where additional information can o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007