A Logic for Analysing Subterfuge in Delegation Chains

نویسندگان

  • Hongbin Zhou
  • Simon N. Foley
چکیده

Trust Management is an approach to construct and interpret the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic credentials are used to specify delegation of authorisation among public keys. Existing trust management schemes are operational in nature, defining security in terms of specific controls such as delegation chains, threshold schemes, and so forth. However, they tend not to consider whether a particular authorisation policy is well designed in the sense that a principle cannot somehow bypass the intent of a complex series of authorisation delegations via some unexpected circuitous route. In this paper we consider the problem of authorisation subterfuge, whereby, in a poorly designed system, delegation chains that are used by principals to prove authorisation may not actually reflect the original intention of all of the participants in the chain. A logic is proposed that provides a systematic way of determining whether a particular delegation scheme using particular authorisation is sufficiently robust to be able to withstand attempts at subterfuge. This logic provides a new characterisation of certificate reduction that, we argue, is more appropriate to open systems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Avoiding Delegation Subterfuge Using Linked Local Permission Names

Trust Management systems are typically explicit in their assumption that principals are uniquely identifiable. However, the literature has not been as prescriptive concerning the uniqueness of the permissions delegated by principals. Delegation subterfuge may arise when there is ambiguity concerning the uniqueness and interpretation of a permission. As a consequence, delegation chains that are ...

متن کامل

Authorisation Subterfuge by Delegation in Decentralised Networks

Trust Management [1, 4, 10] is an approach to constructing and interpreting the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic credentials are used to specify delegation of authorisation among public keys. Existing trust management schemes are operational in nature, defining security in terms of specific controls such as delegation chains...

متن کامل

Analysing Price, Quality and Lead Time Decisions with the Hybrid Solution Method of Fuzzy Logic and Genetic Algorithm

In this paper, the problem of determining the quality level, lead time for order delivery and price of a product produced by a manufacturer is considered. In this problem the demand for the product is influenced by all three decision variables: price, lead time and quality level. To formulate the demand function, a fuzzy rule base that estimates the demand value based on the three decision vari...

متن کامل

A method for access authorisation through delegation networks

Owners of systems and resources usually want to control who can access them. This must be based on having a process for authorising certain parties, combined with mechanisms for enforcing that only authorised parties are actually able to access those systems and resources. In distributed systems, the authorisation process can include negative authorisation (e.g. black listing), and delegation o...

متن کامل

EQUILIBRIUM FOR PROCUREMENT STRATEGY BETWEEN TRIAD COMPETITIVE SUPPLY CHAINS

In today complex worldwide supply chains, intermediary organizations like Contract manufacturers and GPOs are mostly used. Well-known OEMs delegate their purchasing and procuring to these intermediaries. Because of their positive influence on supply chain efficiency, it is very important to investigate the role of intermediaries in today competitive supply chains. One important question arising...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005