Sciweavers

IFIP
2005
Springer

A Logic for Analysing Subterfuge in Delegation Chains

13 years 10 months ago
A Logic for Analysing Subterfuge in Delegation Chains
Abstract. Trust Management is an approach to construct and interpret the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic credentials are used to specify delegation of authorisation among public keys. Existing trust management schemes are operational in nature, defining security in terms of specific controls such as delegation chains, threshold schemes, and so forth. However, they tend not to consider whether a particular authorisation policy is well designed in the sense that a principle cannot somehow bypass the intent of a complex series of authorisation delegations via some unexpected circuitous route. In this paper we consider the problem of authorisation subterfuge, whereby, in a poorly designed system, delegation chains that are used by principals to prove authorisation may not actually reflect the original intention of all of the participants in the chain. A logic is proposed that provides a systematic way of determining...
Hongbin Zhou, Simon N. Foley
Added 27 Jun 2010
Updated 27 Jun 2010
Type Conference
Year 2005
Where IFIP
Authors Hongbin Zhou, Simon N. Foley
Comments (0)