Integrity Constraints in Trust Management (Extended Abstract)


Share/Save/Bookmark

Etalle, Sandro and Winsborough, William H. (2005) Integrity Constraints in Trust Management (Extended Abstract). In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, June 1-3, 2005, Stockholm, Sweden.

[img]PDF
Restricted to UT campus only
: Request a copy
169Kb
Abstract:We introduce the use, monitoring, and enforcement of integrity constraints in trust managementstyle authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then we address the fact that not all participants in a trust management system can be trusted to assist in such monitoring, and show how many integrity constraints can be monitored in a conservative manner so that trusted participants detect and report if the system enters a policy state from which evolution in unmonitored portions of the policy could lead to a constraint violation
Item Type:Conference or Workshop Item
Copyright:© 2005 ACM
Faculty:
Electrical Engineering, Mathematics and Computer Science (EEMCS)
Research Group:
Link to this item:http://purl.utwente.nl/publications/54524
Official URL:http://dx.doi.org/10.1145/1063979.1063981
Export this item as:BibTeX
EndNote
HTML Citation
Reference Manager

 

Repository Staff Only: item control page

Metis ID: 228780