163 Hits in 6.5 sec

Beyond proof-of-compliance: security analysis in trust management

Ninghui Li, John C. Mitchell, William H. Winsborough
2005 Journal of the ACM  
While this makes trust management more flexible than the access matrix model, it makes safety and security analysis more important.  ...  The computational complexity of containment analysis, the most complicated security property we study, forms a complexity hierarchy based on the expressive power of the trust management language. → R P  ...  We thank Fred Schneider and Somesh Jha for discussions that led to our study of safety and availability properties in Trust Management.  ... 
doi:10.1145/1066100.1066103 fatcat:q7fqg5vqmbhj3gxmbdqwkaxuy4

Language based policy analysis in a SPKI Trust Management System

Arun K. Eamani, A. Prasad Sistla
2006 Journal of Computer Security  
SPKI/SDSI can be used to implement a Trust Management System, where the policy for resource access is distributively specified by multiple trusted entities.  ...  Agents in the system need a formal mechanism for understanding the current state of policy.  ...  This is called "Proof of Compliance".  ... 
doi:10.3233/jcs-2006-14402 fatcat:dkkkxnmnszfljo4r5ii6gdajke

Beyond proof-of-compliance: safety and availability analysis in trust management

Ninghui Li, W.H. Winsborough
Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405)  
While trust management is more powerful in certain ways than mechanisms in the access matrix model, and the security properties considered are more than simple safety, we find that in contrast to the classical  ...  We study security properties such as safety and availability for a family of trust management languages, devising algorithms for deciding the possible consequences of certain changes in policy.  ...  We thank Fred Schneider and Somesh Jha for discussions that lead to our study of safety and availability properties in Trust Management. We also thank the anonymous reviewers for their encouragement.  ... 
doi:10.1109/secpri.2003.1199332 dblp:conf/sp/LiWM03 fatcat:s3jwjo6aczabfby5gq4xdqtecu

Effective trust management through a hybrid logical and relational approach

Adam J. Lee, Ting Yu, Yann Le Gall
2010 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security - ASIACCS '10  
In this paper, we investigate one way in which well-established logical trust management systems described in the literature can be deployed within enterprise environments.  ...  As CTM extends the RT family of trust management languages-which are representative of a large class of Datalog-based trust management systems-our work is likely generalizable to other trust management  ...  The research described in this paper was supported by the National Science Foundation under awards CCF-0916015 and CCF-0914946.  ... 
doi:10.1145/1755688.1755710 dblp:conf/ccs/LeeYG10 fatcat:2aek5ng5drhwhk4e5pwjfb55te

Distributed Trust [chapter]

John Ioannidis, Angelos Keromytis
2004 The Practical Handbook of Internet Computing  
Basic questions that must be answered in the design of a trust-management engine include: • How should "proof of compliance" be defined?  ...  An essential part of the trust-management approach is the use of a general-purpose, application independent algorithm for checking proofs of compliance. Why is this a good idea?  ... 
doi:10.1201/9780203507223.ch47 fatcat:qwgaumynmvfwnk4zl2xapmz6r4

Towards a dynamic and composable model of trust

Adam J. Lee, Ting Yu
2009 Proceedings of the 14th ACM symposium on Access control models and technologies - SACMAT '09  
In particular, we conduct a use case analysis to uncover the functional requirements that must be met by composite trust management policy languages.  ...  In this paper, we take the first steps towards developing a comprehensive approach to composite trust management for distributed systems.  ...  In existing trust management systems, the proof of compliance question is answered in a binary manner: either a policy is satisfied, or it is not.  ... 
doi:10.1145/1542207.1542242 dblp:conf/sacmat/LeeY09 fatcat:5ylw4jexojehrbzvgk637aq3xm

What the heck is this application doing? – A security-by-contract architecture for pervasive services

N. Dragoni, F. Massacci, T. Walter, C. Schaefer
2009 Computers & security  
To address the challenges of this paradigm we propose the notion of security-by-contract (S×C ), as in programming-by-contract, based on the notion of a mobile contract that a pervasive download carries  ...  To address the challenges of this paradigm we propose the notion of security-by-contract (S×C ), as in programming-by-contract, based on the notion of a mobile contract that a pervasive download carries  ...  The proof of compliance can be generated by running a static analysis on the code and check for the properties as claimed in the contract.  ... 
doi:10.1016/j.cose.2009.06.005 fatcat:u6umd5qg2bf5jg3atvbv3spgai

Between Scylla and Charybdis: Charting the Wicked Problem of Reusing Health Data for Clinical Research Informatics

Jacqueline Nicholls, Natalie Fitzpatrick, Nathan Lea
2018 IMIA Yearbook of Medical Informatics  
A lack of understanding around the context of data acquisition and sharing undermines the foundations of patient-professional trust.  ...  Methods: A modified thematic review process including identification of agreed critical research questions, appropriate query terms and search strategy, identification of relevant papers in accordance  ...  GDPR now requires proof of compliance and accountability as well as transparency with regards data use so preparations to support this are key to handling these challenges within and outside the EU.  ... 
doi:10.1055/s-0038-1641219 pmid:30157520 fatcat:bns75b7ex5fojpcjai5frziiv4

Security and Privacy Issues in Cloud Computing [article]

Jaydip Sen
2013 arXiv   pre-print
In particular, we discuss three critical challenges: regulatory, security and privacy issues in cloud computing.  ...  However, as the shape of the cloud computing is emerging and developing rapidly both conceptually and in reality, the legal/contractual, economic, service quality, interoperability, security and privacy  ...  The trusted monitor can provide proof of compliance to the data owner, guaranteeing that certain access policies have not been violated.  ... 
arXiv:1303.4814v1 fatcat:2h7xyaefbzaqbkfz3hwnux6pe4

Security in grid computing: A review and synthesis

Erin Cody, Raj Sharman, Raghav H. Rao, Shambhu Upadhyaya
2008 Decision Support Systems  
Each one of these categories is explained in detail in the paper to provide insight as to their unique methods of accomplishing grid security, the types of grid and security situations they apply best  ...  This research framework will aid in future research efforts to define, analyze, and address grid security problems for the many varied types of grid setups, as well as the many security situations that  ...  Mukarram Baig, Department of Computer Science and Engineering, SUNY, Buffalo, New York for his help in revising this document.  ... 
doi:10.1016/j.dss.2007.09.007 fatcat:4kzc7ymfpjazxo2ahr3rnecpqe

An Exploration of Blockchain-based Traceability in Food Supply Chains: On the Benefits of Distributed Digital Records from Farm to Fork

Mika Westerlund, Soham Nene, Seppo Leminen, Mervi Rajahonka
2021 Technology Innovation Management Review  
Also, Professor Seppo Leminen warmly acknowledges the funding from Drammen City Municipality for his chaired professorship of Innovation and Entrepreneurship, which enabled completing his part in the article  ...  In this vein, Provenance could provide a robust proof of compliance to standards by government authorities at the origin and along the entire food supply chain.  ...  Addressing several vulnerabilities in the food supply chain, Walmart's pilots went beyond technology to gain people's trust and confidence in food.  ... 
doi:10.22215/timreview/1446 fatcat:duhujyf5tncdllwzfp55l327l4

On the Use of Formal Specifications as Part of Running Programs [chapter]

Giovanna Di Marzo Serugendo
2006 Lecture Notes in Computer Science  
This paper reviews and discusses the use of formal specifications at run-time from different perspectives: software engineering, run-time code evolution, adaptive middleware, trust and security, or business  ...  It identifies as well application domains and open issues related to the combination of specifications and code in the framework of large scale systems.  ...  Trust-Based Management Systems Trust management systems deal with security policies, credentials and trust relationships (e.g., issuers of credentials).  ... 
doi:10.1007/11738817_14 fatcat:eozwneeh2rax7k3pota3j5wyum

Portable Key Management Service for Cloud Storage

Surya Nepal, Julian Jang-jaccard
2012 Proceedings of the 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing  
Cloud storage services are inherently insecure as the management of the data in the cloud storage is controlled by third parties beyond the reach of the data owner.  ...  The secrets keys used for obfuscation are stored in a secure location while obfuscated data is stored in the cloud. In these approaches, the data is as secure as its corresponding keys.  ...  -High assurance platform authentication: it provides a mechanism where the data owner presents a piece of evidence (i.e. proof of compliance) to the cloud storage server.  ... 
doi:10.4108/icst.collaboratecom.2012.250488 dblp:conf/colcom/Jang-JaccardMN12 fatcat:ouvknlejnfdj7ktzuwg3ck73da

Delegation logic

Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum
2003 ACM Transactions on Privacy and Security  
We adopt the trust-management approach, in which "authorization" is viewed as a "proof-of-compliance" problem: Does a set of credentials prove that a request complies with a policy?  ...  As a trust-management language, D1LP provides a concept of proof-of-compliance that is founded on well-understood principles of logic programming and knowledge representation.  ...  Acknowledgement The first author is currently supported by DARPA through SPAWAR contracts N66001-00-C-8015 and by DoD MURI "Semantics Consistency in Information Exchange" as ONR Grant N00014-97-1-0505.  ... 
doi:10.1145/605434.605438 fatcat:uunkgsqmmndwbnpltp3x5p2ofu

F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure [article]

Laurent Chuat, Cyrill Krähenbühl, Prateek Mittal, Adrian Perrig
2021 arXiv   pre-print
In today's web PKI, all CAs are equally trusted, and security is defined by the weakest link.  ...  F-PKI thus supports a property that is sorely needed in today's Internet: trust heterogeneity.  ...  This certificate is valid during interval I. • Log Trust: LogTrust(L, S) denotes trust in log L for recording certificates issued by authorities in set S. • Proof of Compliance: Proof(L, X, N, I) denotes  ... 
arXiv:2108.08581v1 fatcat:grfezbz5hrdldddxtqnwlww5su
« Previous Showing results 1 — 15 out of 163 results