@inproceedings{cc258d1941a049d3a61d4122f4ea1de1,
title = "Integrity Constraints in Trust Management (Extended Abstract)",
abstract = "We introduce the use, monitoring, and enforcement of integrity constraints in trust managementstyle authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then we address the fact that not all participants in a trust management system can be trusted to assist in such monitoring, and show how many integrity constraints can be monitored in a conservative manner so that trusted participants detect and report if the system enters a policy state from which evolution in unmonitored portions of the policy could lead to a constraint violation.",
keywords = "EWI-698, IR-54524, METIS-228780, SCS-Cybersecurity",
author = "Sandro Etalle and Winsborough, {William H.}",
note = "Imported from DIES; 10th ACM Symp. on Access Control Models and Technologies (SACMAT) ; Conference date: 01-06-2005 Through 03-06-2005",
year = "2005",
month = jun,
doi = "10.1145/1063979.1063981",
language = "Undefined",
isbn = "1-59593-045-0",
publisher = "ACM Press",
pages = "1--10",
editor = "G-J. Ahn",
booktitle = "10th ACM Symp. on Access Control Models and Technologies (SACMAT)",
}