Skip to main content

Freshness Constraints in the RT Framework

  • Conference paper
New Results in Dependability and Computer Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 224))

  • 776 Accesses

Abstract

The work is focused on "time-domain" nonmonotonicity in the RT Framework, which is a Trust Management model. The freshness constraints propagation model that allows for credential revocation is presented. The solution introduces a freshness constraints that turn nonmonotonicity to be temporally monotonic. The freshness graph and propagation rules of freshness constraints are defined. The proposed solution allows policy authors to flexibly define constraints on policy level. Finally, the given model is evaluated against the real-life sample scenario.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li, N., Feigenbaum, J.: Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol. 2339, pp. 166–177. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  2. Pikulski, W.: Nonmonotonicity in Trust Management. In: Szabó, R., Vidács, A. (eds.) EUNICE 2012. LNCS, vol. 7479, pp. 372–383. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  3. Li, N., Mitchell, J., Winsborough, W.: Design of a Role-Based Trust-Management Framework. In: IEEE Symposium on Security and Privacy. IEEE Computer Society Press (2002)

    Google Scholar 

  4. Chapin, P.C., Skalka, C., Wang, X.S.: Authorization in trust management: Features and foundations. ACM Comput. Surv. 40 (2008)

    Google Scholar 

  5. Dong, C., Dulay, N.: Shinren: Non-monotonic Trust Management for Distributed Systems. In: Nishigaki, M., Jøsang, A., Murayama, Y., Marsh, S. (eds.) IFIPTM 2010. IFIP AICT, vol. 321, pp. 125–140. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  6. Skalka, C., Wang, X.S., Chapin, P.C.: Risk management for distributed authorization. Journal of Computer Security 15, 447–489 (2007)

    Google Scholar 

  7. Czenko, M., Etalle, S., Li, D., Winsborough, W.H.: An Introduction to the Role Based Trust Management Framework RT. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2007. LNCS, vol. 4677, pp. 246–281. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  8. Sacha, K.: Credential Chain Discovery in RTT Trust Management Language. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2010. LNCS, vol. 6258, pp. 195–208. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wojciech Pikulski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

Pikulski, W., Sacha, K. (2013). Freshness Constraints in the RT Framework. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) New Results in Dependability and Computer Systems. Advances in Intelligent Systems and Computing, vol 224. Springer, Heidelberg. https://doi.org/10.1007/978-3-319-00945-2_29

Download citation

Publish with us

Policies and ethics