Information carrying identity proof trees

Wiliam H. Winsborough, Anna C. Squicciarini, Elisa Bertino

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In open systems, the verification of properties of subjects is crucial for authorization purposes. Very often access to resources is based on policies that express (possibly complex) requirements in terms of what are referred to variously as identity properties, attributes, or characteristics of the subject. In this paper we provide an approach that an entity called a verifier can use to evaluate queries about properties of a subject requesting resources that are relevent deciding whether the requested action is authorized. Specifically, we contribute techniques that enable reuse of previously computed query results. We consider issues related to temporal validity as well as issues related to confidentiality when one entity reuses query results computed by another entity. We employ constraint logic programming as the foundation of our policy rules and query evaluation. This provides a very general, flexible basis, and enable our work to be applied more or less directly to several existing policy frameworks. The process of evaluation of a query against a subject identity is traced through a structure, referred to as identity proof tree, that carries all information proving that a policy requirement is met.

Original languageEnglish (US)
Title of host publicationWPES'07 - Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society
Pages76-79
Number of pages4
DOIs
StatePublished - 2007
Event6th ACM Workshop on Privacy in the Electronic Society, WPES'07, Held in Association with the 14th ACM Computer and Communications Security Conference - Alexandria, VA, United States
Duration: Oct 29 2007Oct 29 2007

Publication series

NameWPES'07 - Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society

Other

Other6th ACM Workshop on Privacy in the Electronic Society, WPES'07, Held in Association with the 14th ACM Computer and Communications Security Conference
Country/TerritoryUnited States
CityAlexandria, VA
Period10/29/0710/29/07

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality
  • Social Sciences (miscellaneous)

Fingerprint

Dive into the research topics of 'Information carrying identity proof trees'. Together they form a unique fingerprint.

Cite this