Maintaining control while delegating trust: Integrity constraints in trust management

Share/Save/Bookmark

Etalle, Sandro and Winsborough, William H. (2009) Maintaining control while delegating trust: Integrity constraints in trust management. ACM Transactions on Information and System Security, 13 (1). p. 5. ISSN 1094-9224

[img]PDF
Restricted to UT campus only
: Request a copy
327Kb
Abstract:We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then, we address the fact that not all participants in a trust-management system can be trusted to assist in such monitoring, and show how many integrity constraints can be monitored in a conservative manner so that trusted participants detect and report if the system enters a policy state from which evolution in unmonitored portions of the policy could lead to a constraint violation.
Item Type:Article
Copyright:© 2009 ACM
Faculty:
Electrical Engineering, Mathematics and Computer Science (EEMCS)
Research Group:
Link to this item:http://purl.utwente.nl/publications/69534
Official URL:http://dx.doi.org/10.1145/1609956.1609961
Export this item as:BibTeX
EndNote
HTML Citation
Reference Manager

 

Repository Staff Only: item control page