Any large scale security architecture that uses certificates to provide security in a distributed system will need some automated support for moving certificates around in the network. We believe that for efficiency, this automated support should be tied closely to the consumer of the certificates: the policy verifier. As a proof of concept, we have built QCM, a prototype policy language and verifier that can direct a retrieval mechanism to obtain certificates from the network. Like previous verifiers, QCM takes a policy and certificates supplied by a requester and determines whether the policy is satisfied. Unlike previous verifiers, QCM can take further action if the policy is not satisfied: QCM can examine the policy to decide what certificates might help satisfy it and obtain them from remote servers on behalf of the requester. This takes place automatically, without intervention by the requester; there is no additional burden placed on the requester or the policy writer for the retrieval service we provide. We present examples that show how our technique greatly simplifies certificate-based secure applications ranging from key distribution to ratings systems, and that QCM policies are simple to write. We describe our implementation, and illustrate the operation of the prototype. Comments University of Pennsylvania Department of Computer and Information Science Technical Report No. MSCIS-99-07. This technical report is available at ScholarlyCommons: https://repository.upenn.edu/cis_reports/140 Policy-Directed Certificate Retrieval Technical Report MS-CIS-99-07 Carl A. Gunter and Trevor Jim University of Pennsylvania
[1]
Frann Cois Rouaix.
A Web Navigator with Applets in Caml
,
1996
.
[2]
Ronald L. Rivest,et al.
SDSI - A Simple Distributed Security Infrastructure
,
1996
.
[3]
Joan Feigenbaum,et al.
Decentralized trust management
,
1996,
Proceedings 1996 IEEE Symposium on Security and Privacy.
[4]
P. Resnick.
FILTERING INFORMATION ON THE INTERNET
,
1997
.
[5]
Carl A. Gunter,et al.
PLANet: an active internetwork
,
1999,
IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[6]
Donald E. Eastlake,et al.
Domain Name System Security Extensions
,
1997,
RFC.
[7]
Joan Feigenbaum,et al.
Managing trust in an information-labeling system
,
1997,
Eur. Trans. Telecommun..
[8]
Paul Resnick,et al.
PICS: Internet access controls without censorship
,
1996,
CACM.
[9]
Moni Naor,et al.
Certificate revocation and certificate update
,
1998,
IEEE Journal on Selected Areas in Communications.
[10]
Carl A. Gunter,et al.
PLAN: a packet language for active networks
,
1998,
ICFP '98.