Abstract
The topic of this paper is RTT, a language from the family of Role-based Trust management (RT) languages, which is used for representing security policies and credentials in distributed large scale access control systems. A credential provides information about the privileges of users and the security policies issued by one or more trusted authorities. RT languages combine trust management and Role Based Access Control features. RTT provides manifold roles to express threshold and separation of duties policies. A manifold role defines sets of entities whose cooperation satisfies the manifold role. The goal of this paper is introduction of time validity constraints to show how that can make RTT language more realistic. The core part of the paper describes a sound and complete inference system, in which credentials can be derived from an initial set of credentials using a set of inference rules.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: 17th IEEE Symposium on Security and Privacy, Oakland, CA, pp. 164–173 (1996)
Chadwick, D., Otenko, A., Ball, E.: Role-Based Access Control with X.509 Attribute Certificates. IEEE Internet Comput. 2, 62–69 (2003)
Chapin, P., Skalka, C., Wang, X.S.: Authorization in Trust Management: Features and Foundations. ACM Comput. Surv. 3, 1–48 (2008)
Czenko, M., Etalle, S., Li, D., Winsborough, W.H.: An introduction to the role based trust management framework RT. Foundations of Security Analysis and Design IV. Springer, Heidelberg (2007)
Felkner, A.: Modeling Trust Management in Computer Systems. In: Proc. 9th International PhD Workshop OWD 2007, PTETiS, vol. 23, pp. 65–70 (2007)
Felkner, A., Sacha, K.: The Semantics of Role-Based Trust Management Languages. In: CEE-SET 2009, pp. 195–206 (2009) (preprints)
Felkner, A., Sacha, K.: Deriving RTT Credentials for Role-Based Trust Management. e-Informatica Software Engineering Journal 4(1), 9–19 (2010)
Gorla, D., Hennessy, M., Sassone, V.: Inferring Dynamic Credentials for Role-Based Trust Management. In: Proc. 8th ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, pp. 213–224. ACM, New York (2006)
Li, N., Mitchell, J.: RT: A Role-Based Trust-Management Framework. In: Proc. 3rd DARPA Information Survivability Conference and Exposition, pp. 201–212. IEEE Computer Society Press, Oakland (2003)
Li, N., Mitchell, J., Winsborough, W.: Design of a Role-Based Trust-Management Framework. In: Proc. IEEE Symposium on Security and Privacy, pp. 114–130. IEEE Computer Society Press, Oakland (2002)
Li, N., Winsborough, W., Mitchell, J.: Beyond proof-of-Compliance: Safety and Availability Analysis in Trust Management. In: Proc. IEEE Symposium on Security and Privacy, pp. 123–139. IEEE Computer Society Press, Oakland (2003)
Li, N., Winsborough, W., Mitchell, J.: Distributed Credential Chain Discovery in Trust Management. J. Comput. Secur. 1, 35–86 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Felkner, A., Kozakiewicz, A. (2011). Time Validity in Role-Based Trust Management Inference System. In: Lee, C., Seigneur, JM., Park, J.J., Wagner, R.R. (eds) Secure and Trust Computing, Data Management, and Applications. STA 2011. Communications in Computer and Information Science, vol 187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22365-5_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-22365-5_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22364-8
Online ISBN: 978-3-642-22365-5
eBook Packages: Computer ScienceComputer Science (R0)