More practical application of Trust management credentials

Trust management is an approach to access control in distributed open systems, where access control decisions are based on policy statements made by multiple principals. The family of Role-based Trust management languages (RT) is an effective means for representing security policies and credentials in decentralized, distributed, large scale access control systems. It provides a set of role assignment credentials. A credential provides information about the privileges of users and the security policies issued by one or more trusted authorities. The main purpose of this paper is to show how extensions can make the RT family languages more useful in practice. It shows how security policies can be made more realistic by including timing information, maintaining the procedure or parameterizing the validity of credentials.

[1]  Turgay Korkmaz,et al.  Mobile Ad-Hoc Networks Security , 2012, CSIE 2012.

[2]  Jerry den Hartog,et al.  Nonmonotonic Trust Management for P2P Applications , 2005, STM.

[3]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[4]  Sandro Etalle,et al.  An Introduction to the Role Based Trust Management Framework RT , 2007, FOSAD.

[5]  Chithra Selvaraj,et al.  A Role Based Trust Model for Peer to Peer Systems Using Credential Trees , 2011 .

[6]  Joan Feigenbaum,et al.  The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.

[7]  Daniele Gorla,et al.  Inferring dynamic credentials for rôle-based trust management , 2006, PPDP '06.

[8]  Joan Feigenbaum,et al.  Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.

[9]  Hongchang Liu,et al.  Role-based Trust Management Model in Multi-domain Environment , 2012 .

[11]  Anna Felkner How the Role-Based Trust Management Can Be Applied to Wireless Sensor Networks , 2012 .

[12]  Anna Felkner,et al.  Time Validity in Role-Based Trust Management Inference System , 2011, STA Workshops.

[13]  Krzysztof Sacha,et al.  Deriving RTT Credentials for Role-Based Trust Management , 2010, e Informatica Softw. Eng. J..

[14]  A. Felkner,et al.  RTT+ - Time Validity Constraints in RTT Language , 2012 .

[15]  Ninghui Li,et al.  Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[16]  Ninghui Li,et al.  Distributed Credential Chain Discovery in Trust Management , 2003, J. Comput. Secur..

[17]  Anna Sankowska,et al.  Trust management in virtual work environments : a human factors perspective , 2008 .

[18]  Xiaoyang Sean Wang,et al.  Authorization in trust management: Features and foundations , 2008, CSUR.

[19]  Ronald L. Rivest,et al.  Certificate Chain Discovery in SPKI/SDSI , 2002, J. Comput. Secur..