Integrity Constraints in Trust Management

Speaker:  Sandro Etalle - Universita` di Twente, DIES: distributed and embedded system group
  Tuesday, May 10, 2005 at 5:30 PM ore 17.00: te`, caffe` & C.
Abstract: We introduce the use, monitoring, and enforcement of
integrity constraints in trust management (TM) style authorizatio
systems. We show how this relates to the safety problem of TM. We
consider what portions of the policy state must be monitored to detect
violations of integrity constraints. Then we address the fact that not
all participants in a trust management system can be trusted to assist
in such monitoring, and show how many integrity constraints can be
monitored in a conservative manner so that trusted participants detect
and report if the system enters a policy state from which evolution in
unmonitored portions of the policy could lead to a constraint
violation.

Related areas: Logic and formal methods, languages, security and
safety analysis, access control.

Place
Ca' Vignal - Piramide, Floor 0, Hall Verde

Programme Director
Roberto Giacobazzi

External reference
Publication date
May 5, 2005

Studying

Share