SD3: A Trust Management System with Certified Evaluation
نویسنده
چکیده
We introduce SD3, a trust management system consisting of a high-level policy language, a local policy evaluator, and a certificate retrieval system. A unique feature of SD3 is its certified evaluator: as the evaluator computes the answer to a query, it also computes a proof that the answer follows from the security policy. Before the answer is returned, the proof is passed through a simple checker, and incorrect proofs are reported as errors. The certified evaluator reduces the trusted computing base and greatly increases our confidence that the answers produced by the evaluator follow from the specification, despite complex optimizations. To illustrate SD3’s capabilities, we show how to implement a secure name service, similar to DNSSEC, entirely in SD3.
منابع مشابه
Secure and Effective P2P Reputation System using Trust Management and Self Certified Cryptographic Exchanges
The main reason behind the success of Peer-to-Peer (P2P) networks is the anonymity and the utility offered by them to the users. The Client-server security policies implemented in centralized distributed systems do not provide a desirable solution for P2P networks to store peer reputation information. Though a centralized system does exist, it is prone to Sybil attack that can significantly red...
متن کاملEvaluation Methodology for Assessing Management System Establishment Support Tools
The establishment and operation of a certified management system (e.g. for Quality Management or Information Security Management) according to an international standard is a complex task for an organization. Hence, organizations usually search for support in order to successfully establish the management system and pass the certification procedure. This support is represented by consultants and...
متن کاملConsequences of The Auditor's Confidence to The Client and The Provision of Solutions
The purpose of this study is to explain the model of auditor trust in the client with an emphasis on pathology and presenting a strategy using a qualitative research method and grounded theory approach. This study was conducted in 1398 by conducting 12 in-depth interviews with partners of auditing institutes, members of the Iranian Society of Certified Public Accountants and the Audit and Manag...
متن کاملPolicy-hiding Access Control in Open Environment Policy-hiding Access Control in Open Environment *
In Trust Management and attribute-based access control systems, access control decisions are based on the attributes (rather than the identity) of the requester: Access is granted if Alice’s attributes in her certificates satisfy Bob’s access policy. In this paper, we develop a policy-hiding access control scheme that protects both sensitive attributes and sensitive policies. That is, Bob can d...
متن کاملEvaluation of the Quality Management System due to the Implementation of the SLIPTA Program at the Bamenda Regional Hospital Laboratory, Cameroon
Background and Aims: Improving the Quality Management System (QMS) of clinical laboratories and achieving accreditation are important in health care delivery. It can be achieved by implementing the World Health Organizaton Stepwise Laboratory Improvement Process Towards Accreditation (SLIPTA). The SLIPTA program was introduced to the Bamenda Regional Hospital (BRHL) in 2010. Our objectives were...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001