A Logic for Analysing Subterfuge in Delegation Chains
نویسندگان
چکیده
Trust Management is an approach to construct and interpret the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic credentials are used to specify delegation of authorisation among public keys. Existing trust management schemes are operational in nature, defining security in terms of specific controls such as delegation chains, threshold schemes, and so forth. However, they tend not to consider whether a particular authorisation policy is well designed in the sense that a principle cannot somehow bypass the intent of a complex series of authorisation delegations via some unexpected circuitous route. In this paper we consider the problem of authorisation subterfuge, whereby, in a poorly designed system, delegation chains that are used by principals to prove authorisation may not actually reflect the original intention of all of the participants in the chain. A logic is proposed that provides a systematic way of determining whether a particular delegation scheme using particular authorisation is sufficiently robust to be able to withstand attempts at subterfuge. This logic provides a new characterisation of certificate reduction that, we argue, is more appropriate to open systems.
منابع مشابه
Avoiding Delegation Subterfuge Using Linked Local Permission Names
Trust Management systems are typically explicit in their assumption that principals are uniquely identifiable. However, the literature has not been as prescriptive concerning the uniqueness of the permissions delegated by principals. Delegation subterfuge may arise when there is ambiguity concerning the uniqueness and interpretation of a permission. As a consequence, delegation chains that are ...
متن کاملAuthorisation Subterfuge by Delegation in Decentralised Networks
Trust Management [1, 4, 10] is an approach to constructing and interpreting the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic credentials are used to specify delegation of authorisation among public keys. Existing trust management schemes are operational in nature, defining security in terms of specific controls such as delegation chains...
متن کاملAnalysing Price, Quality and Lead Time Decisions with the Hybrid Solution Method of Fuzzy Logic and Genetic Algorithm
In this paper, the problem of determining the quality level, lead time for order delivery and price of a product produced by a manufacturer is considered. In this problem the demand for the product is influenced by all three decision variables: price, lead time and quality level. To formulate the demand function, a fuzzy rule base that estimates the demand value based on the three decision vari...
متن کاملA method for access authorisation through delegation networks
Owners of systems and resources usually want to control who can access them. This must be based on having a process for authorising certain parties, combined with mechanisms for enforcing that only authorised parties are actually able to access those systems and resources. In distributed systems, the authorisation process can include negative authorisation (e.g. black listing), and delegation o...
متن کاملEQUILIBRIUM FOR PROCUREMENT STRATEGY BETWEEN TRIAD COMPETITIVE SUPPLY CHAINS
In today complex worldwide supply chains, intermediary organizations like Contract manufacturers and GPOs are mostly used. Well-known OEMs delegate their purchasing and procuring to these intermediaries. Because of their positive influence on supply chain efficiency, it is very important to investigate the role of intermediaries in today competitive supply chains. One important question arising...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005