Maintaining Control While Delegating Trust: Integrity Constraints In Trust Management

ACM Transactions on Information and System Security(2009)

引用 4|浏览3
暂无评分
摘要
We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then, we address the fact that not all participants in a trust-management system can be trusted to assist in such monitoring, and show how many integrity constraints can be monitored in a conservative manner so that trusted participants detect and report if the system enters a policy state from which evolution in unmonitored portions of the policy could lead to a constraint violation.
更多
查看译文
关键词
Security,Theory,Languages,Access control,trust management,distributed system security,integrity
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要