Integrity Constraints in Trust Management (Extended Abstract)

Sandro Etalle, William H. Winsborough

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    16 Downloads (Pure)

    Abstract

    We introduce the use, monitoring, and enforcement of integrity constraints in trust managementstyle authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then we address the fact that not all participants in a trust management system can be trusted to assist in such monitoring, and show how many integrity constraints can be monitored in a conservative manner so that trusted participants detect and report if the system enters a policy state from which evolution in unmonitored portions of the policy could lead to a constraint violation.
    Original languageUndefined
    Title of host publication10th ACM Symp. on Access Control Models and Technologies (SACMAT)
    EditorsG-J. Ahn
    Place of PublicationNew York
    PublisherACM Press
    Pages1-10
    Number of pages10
    ISBN (Print)1-59593-045-0
    DOIs
    Publication statusPublished - Jun 2005
    Event10th ACM Symp. on Access Control Models and Technologies (SACMAT) - Stockholm, Sweden
    Duration: 1 Jun 20053 Jun 2005

    Publication series

    Name
    PublisherACM Press

    Conference

    Conference10th ACM Symp. on Access Control Models and Technologies (SACMAT)
    Period1/06/053/06/05
    OtherJune 01 - 03, 2005

    Keywords

    • EWI-698
    • IR-54524
    • METIS-228780
    • SCS-Cybersecurity

    Cite this