Compliance Checking in the PolicyMaker Trust Management System
نویسندگان
چکیده
Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that receives a signed request for action is forced to answer the central question \Is the key used to sign this request authorized to take this action?" In some services, this question reduces to \Does this key belong to this person?" In others, the authorization question is more complicated, and resolving it requires techniques for formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, and deferring trust to third parties. Blaze, Feigenbaum, and Lacy [1] identi ed this trust management problem as a distinct and important component of network services and described a general tool for addressing it, the PolicyMaker trust management system. At the heart of a trust management system is an algorithm for compliance checking.The inputs to the compliance checker are a request, a policy, and a set of credentials. The compliance checker returns yes or no, depending on whether the credentials constitute a proof that the request complies with the policy. Thus a central challenge in trust management is to nd an appropriate notion of \proof" and an e cient algorithm for checking proofs of compliance. In this paper, we present the notion of proof that is used in the current version of the PolicyMaker trust management system. We show that this notion of proof leads to a compliance-checking problem that is undecidable in its most general form and is NP-hard even if restricted in several natural ways. We identify a special case of the problem that is solvable in polynomial time and is widely applicable. The algorithm that we give for this special case has been implemented and is used in the current version of the PolicyMaker system.
منابع مشابه
Managing trust in an information-labeling system
Many network services need to make \trust management" decisions; in particular, processing users' requests for action often requires using labels and credentials that may not be authentic or trustworthy. In this paper, we address the problem of trust management in information labeling. The Platform for Internet Content Selection (PICS), proposed by Resnick and Miller 13], establishes a exible w...
متن کاملModeling Trust Management System for Grids1
Grid computing has been widely accepted as a promising paradigm for large-scale resources sharing in recent years. However, the general authorization mechanism, called trust management system, for grids is not wellunderstood. The purpose of this paper is to provide a logic-based formal approach to modeling authorization mechanisms of grids. We develop a logicbased language, called Trust Logic, ...
متن کاملTransparent Internet E-mail Security
This paper describes the design and prototype implementation of a comprehensive system for securing Internet e-mail transparently, so that the only user intervention required is the initial setup and speciication of a trust policy. Our system uses the PolicyMaker trust management engine for evaluating the trustworthiness of keys, in particular whether the given binding between key and name is v...
متن کاملPresenting the Model of Tax Compliance with the realization approach of Eghtesad Moghavemati: The Role of Internal and Psychological Factors
Today, the concept of tax compliance has become a common phenomenon in the most countries and identifying the factors which affecting on it, specially internal and psychological factors instead of economic factors, attracted the attention of a large number of researchers in all over the world. So, the purpose of this study is to present a model of tax compliance with the realization approach of...
متن کاملExperience with the KeyNote Trust Management System: Applications and Future Directions
Access control in distributed systems has been an area of intense research in recent years. One promising approach has been that of trust management, whereby authentication and authorization decisions are combined in a unified framework for evaluating security policies and credentials. In this paper, we report on our experience of the past seven years using the PolicyMaker and the KeyNote trust...
متن کامل