Implementation aspects of a delegation system

In this paper we simulate an authorization and delegation system using knowledge based technology. This proposal is part of a visual tool that is intended to be an implementation of the theoretical model weighted trust graph (WTG). A brief description of WTG Model and its associated tool is included in the text. In essence, the model is based on the inclusion of real numbers between zero and one in certificates to represent the trust level between the entities involved in them. This trust level is used to control delegation. Moreover, attributes from di_erent domains may be interrelated, so attribute delegation is also taken into account. The proposed Simulation Engine supports one directional and bidirectional search algorithms.

[1]  Carlos Cotta,et al.  Analyzing Directed Acyclic Graph Recombination , 2001, Fuzzy Days.

[2]  Tuomas Aura,et al.  Fast Access Control Decisions from Delegation Certificate Databases , 1998, ACISP.

[3]  Ninghui Li,et al.  Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[4]  José A. Montenegro,et al.  A Representation Model of Trust Relationships with Delegation Extensions , 2005, iTrust.

[5]  Javier López,et al.  Graphical Representation of Authorization Policies for Weighted Credentials , 2006, ACISP.

[6]  Vijay Varadharajan,et al.  Logic-Based Reasoning on Delegatable Authorizations , 2002, ISMIS.

[7]  Tuomas Aura,et al.  On the structure of delegation networks , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).