Abstract
Trust management is a unified approach to access control in open distributed systems, where decisions connected with access control are based on policy statements made by many principals. The family of Role-based Trust management languages (RT) is an effective means for representing security policies, credentials and relationship in distributed, decentralized, large scale access control systems. It delivers a set of role assignment credentials and is used in systems where the identities of users are not the most important form of identification. A credential gives information about the privileges of users and the security policies issued by (usually more than one) trusted authorities. The main purpose of this article is to show how some credential extensions can make a trust management system more useful in practice. It shows how security systems can be made more realistic by maintaining the procedure or including timing information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trustmanagement. In: Proceedings of the 17th IEEE Symposium on Security andPrivacy, Oakland CA, 1996, pp. 164–173. http://dx.doi.org/10.1109/SECPRI.1996.502679
Czenko, M.R.: Nonmonotonic trust management for P2P applications. In: Proceedings of the 1st International Workshop Security and Trust Management STM, et al.: Milan, Italy, vol. 2005 (2005). http://dx.doi.org/10.1016/j.entcs.2005.09.037
Felkner, A., Sacha, K.: Deriving \(RT^T\) credentials for role-based trust management, e-Informatica. Softw. Eng. J. 4(1), 9–19 (2010)
Felkner, A., Kozakiewicz, A.: \(RT^T_+\)-time validity constraints in \(RT^T\) language. J. Telecommun. Inf. Technol. 2, 74–82 (2012)
Felkner, A., Kozakiewicz, A.: Time validity in role-based trust management inference system. secure and trust computing, data management, and applications communications. Comput. Inf. Sci. 187, 7–15 (2011). http://dx.doi.org/10.1007/978-3-642-22365-5_2
Felkner, A., Kozakiewicz, A.: More practical application of trust management credentials. In: Proceedings of the Federated Conference on Computer Science and Information Systems (FedCSIS), 2015, pp. 1137–1146
Gorla, D., Hennessy, M., Sassone, V.: Inferring dynamic credentials for role-based trust management. In: Proceedings of the 8th Conference on Principles and Practice of Declarative Programming, ACM, 2006, pp. 213–224. http://dx.doi.org/10.1145/1140335.1140361
Li, N., Winsborough, W., Mitchell, J.: Distributed credential chain discovery in trust management. J. Comput. Secur. 1, 35–86 (2003)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this paper
Cite this paper
Felkner, A., Kozakiewicz, A. (2017). Practical Extensions of Trust Management Credentials. In: Grzenda, M., Awad, A., Furtak, J., Legierski , J. (eds) Advances in Network Systems . iNetSApp 2015. Advances in Intelligent Systems and Computing, vol 461. Springer, Cham. https://doi.org/10.1007/978-3-319-44354-6_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-44354-6_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44352-2
Online ISBN: 978-3-319-44354-6
eBook Packages: EngineeringEngineering (R0)