Customizing Distributed Proofs of Authorization

نویسندگان

  • Charles C. Zhang
  • Marianne Winslett
چکیده

When identity-based authorization becomes difficult due to the scalability requirements and highly dynamic nature of open distributed systems, digitally certifiable attributes can be an effective basis for specifying authorization policies. Before an authorization decision is made in such a system, a client needs to collect a set of credentials to prove that it satisfies the authorization policies. The process to construct such a proof is often interactive and multilateral, involving multiple parties iteratively requesting credentials from one another before presenting all their own relevant credentials; we call this a distributed proof of authorization (DPA). DPAs can be carried out in multiple ways. A resource provider can passively wait for its clients to gather all the credentials required for them to gain access; others can take a proactive approach by directly requesting all credentials from the appropriate issuers on behalf of their client. To move away from these two extremes, which raise issues of efficiency and completeness, we propose Query Routing Rules (QRR) to customize distributed credential collection within a P2P authorization framework called MultiTrust, which gives peers autonomy in deciding whether and how they respond to authorization requests. We provide a distributed proof construction algorithm that peers can use to reason about authorizations based on the access control policies and QRRs. This algorithm is configurable, sound, and complete with regard to the search space covered by QRRs. By configuring different QRRs, MultiTrust can not only use flexible strategies to improve the performance of DPA, but also emulate other distributed trust management frameworks such as QCM and RT0 and serve as a reasoning framework for authorization in heterogeneous distributed systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Proof-Carrying Authorization System

We describe an infrastructure for distributed authorization based on the ideas of proof-carrying authorization (PCA). PCA is more general and more flexible than traditional distributed authorization systems. We extend PCA with the notion of goals and sessions, and add a module system to the proof language. Our framework makes it possible to locate and use pieces of the security policy that have...

متن کامل

Distributed System Security via Logical Frameworks

We describe a project to advance security in distributed systems via the application of logical frameworks. At the heart of the effort lies an authorization logic which plays a triple role: (1) to specify an access-control policy as a logical theory, (2) to enforce the policy by mechanically verifying proofs in the logic, and (3) to reason about the policy by characterizing the space of all pos...

متن کامل

Using Views for Customizing Reusable Components in Component-Based Frameworks

Increasingly, scalable distributed applications are being constructed by integrating reusable components spanning multiple administrative domains. Dynamic composition and deployment of such applications provides additional benefits, enabling the application to flexibly adapt to changing client and network characteristics, achieve load balancing, and satisfy QoS requirements. However, dynamic de...

متن کامل

Confidentiality-Preserving Distributed Proofs of Conjunctive Queries (Extended Version)

Distributed proof construction protocols have been shown to be valuable for reasoning about authorization decisions in open distributed environments such as pervasive computing spaces. Unfortunately, existing distributed proof protocols offer only limited support for protecting the confidentiality of sensitive facts, which limits their utility in many practical scenarios. In this paper, we prop...

متن کامل

Here’s Your Lego Security Kit: How to Give Developers All Protection Mechanisms They Will Ever Need

The main premise of this paper is that the developers and owners of distributed applications need and can be provided with three things: 1) Lego -like reusable and versatile building blocks, 2) middleware architectures and tools for composing useful customized solutions out of such blocks, and 3) the means of creating their own inexpensive and error-proof building blocks. They could then create...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007