Time validity of credentials in RTT+ language

Anna Felkner, Adam Kozakiewicz

Abstract


The topic of this paper is RTT, a language from the family of RT languages, which is used for representing security policies and credentials in distributed access control systems. The goal of this paper is introduction of time validity constraints to show how that can make RTT language more realistic.

Keywords


trust management; role-based trust management; inference system

Full Text:

PDF (Polski)

References


Blaze M., Feigenbaum J., Lacy J.: Decentralized Trust Management. In: 17th IEEE Symposium on Security and Privacy. Oakland CA (1996), s. 164-173.

Chapin P., Skalka C., Wang X. S.: Authorization in Trust Management: Features and Foundations. ACM Comput. Surv. 3, (2008), s. 1-48.

Felkner A., Sacha K.: The Semantics of Role-Based Trust Management Languages. CEESET 2009 (preprints), (2009), s. 195-206.

Felkner A., Sacha K.: Deriving RT T Credentials for Role-Based Trust Management. e-Informatica Software Engineering Journal, Vol. 4. Issue 1, (2010), s. 9-19.

Gorla D., Hennessy M., Sassone V.: Inferring Dynamic Credentials for Role-Based Trust Management. Proc. 8th ACM SIGPLAN PPDP'06, (2006), s. 213-224.

Li N., Mitchell J.: RT: A Role-Based Trust-Management Framework. Proc. 3rd DARPA Information Survivability Conference and Exposition, (2003), s. 201-212.

Li N., Winsborough W., Mitchell J.: Distributed Credential Chain Discovery in Trust Management. J. Comput. Secur. 1, (2003), s. 35-86.




DOI: http://dx.doi.org/10.21936/si2011_v32.n3A.238