Skip to main content

Time Validity in Role-Based Trust Management Inference System

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 187))

Abstract

The topic of this paper is RTT, a language from the family of Role-based Trust management (RT) languages, which is used for representing security policies and credentials in distributed large scale access control systems. A credential provides information about the privileges of users and the security policies issued by one or more trusted authorities. RT languages combine trust management and Role Based Access Control features. RTT provides manifold roles to express threshold and separation of duties policies. A manifold role defines sets of entities whose cooperation satisfies the manifold role. The goal of this paper is introduction of time validity constraints to show how that can make RTT language more realistic. The core part of the paper describes a sound and complete inference system, in which credentials can be derived from an initial set of credentials using a set of inference rules.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: 17th IEEE Symposium on Security and Privacy, Oakland, CA, pp. 164–173 (1996)

    Google Scholar 

  2. Chadwick, D., Otenko, A., Ball, E.: Role-Based Access Control with X.509 Attribute Certificates. IEEE Internet Comput. 2, 62–69 (2003)

    Article  Google Scholar 

  3. Chapin, P., Skalka, C., Wang, X.S.: Authorization in Trust Management: Features and Foundations. ACM Comput. Surv. 3, 1–48 (2008)

    Article  Google Scholar 

  4. Czenko, M., Etalle, S., Li, D., Winsborough, W.H.: An introduction to the role based trust management framework RT. Foundations of Security Analysis and Design IV. Springer, Heidelberg (2007)

    Book  Google Scholar 

  5. Felkner, A.: Modeling Trust Management in Computer Systems. In: Proc. 9th International PhD Workshop OWD 2007, PTETiS, vol. 23, pp. 65–70 (2007)

    Google Scholar 

  6. Felkner, A., Sacha, K.: The Semantics of Role-Based Trust Management Languages. In: CEE-SET 2009, pp. 195–206 (2009) (preprints)

    Google Scholar 

  7. Felkner, A., Sacha, K.: Deriving RTT Credentials for Role-Based Trust Management. e-Informatica Software Engineering Journal 4(1), 9–19 (2010)

    Google Scholar 

  8. Gorla, D., Hennessy, M., Sassone, V.: Inferring Dynamic Credentials for Role-Based Trust Management. In: Proc. 8th ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, pp. 213–224. ACM, New York (2006)

    Google Scholar 

  9. Li, N., Mitchell, J.: RT: A Role-Based Trust-Management Framework. In: Proc. 3rd DARPA Information Survivability Conference and Exposition, pp. 201–212. IEEE Computer Society Press, Oakland (2003)

    Google Scholar 

  10. Li, N., Mitchell, J., Winsborough, W.: Design of a Role-Based Trust-Management Framework. In: Proc. IEEE Symposium on Security and Privacy, pp. 114–130. IEEE Computer Society Press, Oakland (2002)

    Google Scholar 

  11. Li, N., Winsborough, W., Mitchell, J.: Beyond proof-of-Compliance: Safety and Availability Analysis in Trust Management. In: Proc. IEEE Symposium on Security and Privacy, pp. 123–139. IEEE Computer Society Press, Oakland (2003)

    Google Scholar 

  12. Li, N., Winsborough, W., Mitchell, J.: Distributed Credential Chain Discovery in Trust Management. J. Comput. Secur. 1, 35–86 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Felkner, A., Kozakiewicz, A. (2011). Time Validity in Role-Based Trust Management Inference System. In: Lee, C., Seigneur, JM., Park, J.J., Wagner, R.R. (eds) Secure and Trust Computing, Data Management, and Applications. STA 2011. Communications in Computer and Information Science, vol 187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22365-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22365-5_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22364-8

  • Online ISBN: 978-3-642-22365-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics