Verifying a delegation protocol for grid systems

نویسندگان

  • Benjamin Aziz
  • Geoff W. Hamilton
چکیده

In this paper, we design a non-uniform static analysis for formally verifying a protocol used in large-scale Grid systems for achieving delegations from users to critical system services. The analysis reveals a few shortcomings in the protocol, such as the lack of token integrity and the possibility of repudiating a delegation session. It also reveals the vulnerability of nondeterministic delegation chains that was detected as a result of adopting a more precise analysis, which allows for more participants in the protocol than did the original protocol designers envisage.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Correcting a Delegation Protocol for Grids

Delegation is one important aspect of large-scale distributed systems where many processes and operations run on behalf of system users and clients in order to achieve highly computational and resource intensive tasks. As such, delegation is often synonymous with the concept of trust, in that the delegator would expect some degree of reliability regarding the delegatee’s ability and predictabil...

متن کامل

6.892 Computing on Encrypted Data

So far, we have studied the problem of outsourcing computation when we want our data to be private from the server. Today, we will forget about privacy and focus on the problem of verifying that the server computes correctly for us. Specifically, we will look at decision problems. We consider the problem where we send the cloud x, and the cloud (efficiently) computes both f(x) as well as a proo...

متن کامل

Using Trust for Restricted Delegation in Grid Environments

Delegation is an important tool for authorization in large distributed environments. However, current delegation mechanisms used in emerging Grids have problems to allow for flexible and secure delegation. This paper presents a framework to realize restricted delegation using a specific attribute certificate with trust value in grid environments. The framework employs attribute certificates to ...

متن کامل

On the application of identity-based cryptography in grid security

This thesis examines the application of identity-based cryptography (IBC) in designing security infrastructures for grid applications. In this thesis, we propose a fully identity-based key infrastructure for grid (IKIG). Our proposal exploits some interesting properties of hierarchical identity-based cryptography (HIBC) to replicate security services provided by the grid security infrastructure...

متن کامل

A Resilient Two - Server Authentication Mechanism for Enhancing Security in Grid Environment

Most of the familiar protocols use single server for storing all the needed information to authenticate a user. Maintenance of security is of primary importance in any computing environment. Safe and effective authentication mechanism and evaluation methods of the entity are of utmost importance for the grid users to facilitate legitimate utilization of resources. It improves the legal user's c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Future Generation Comp. Syst.

دوره 27  شماره 

صفحات  -

تاریخ انتشار 2011