[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1755688.1755710acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Effective trust management through a hybrid logical and relational approach

Published: 13 April 2010 Publication History

Abstract

Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be effectively deployed. In this paper, we investigate one way in which well-established logical trust management systems described in the literature can be deployed within enterprise environments. Specifically, we develop a framework within which logical trust management policies can be managed using a relational DBMS. We describe a correct and complete procedure for compiling CTM credentials into dynamic views within a database, and show how the resulting system can be used to perform role membership checks or to enumerate the members of a given role. We then propose a hybrid algorithm that leverages the logical ruleset and the underlying DBMS to efficiently enumerate the capabilities ascribed to a given user. We also present an evaluation of a prototype implementation of our framework that demonstrates the practicality of our approach. As CTM extends the RT family of trust management languages---which are representative of a large class of Datalog-based trust management systems---our work is likely generalizable to other trust management approaches.

References

[1]
L. Bauer, S. Garriss, and M. K. Reiter. Distributed proving in access-control systems. In Proceedings of the 2005 IEEE Symposium on Security and Privacy, pages 81--95, May 2005.
[2]
M. Y. Becker, C. Fournet, and A. D. Gordon. SecPAL: Design and semantics of a decentralized authorization language. Journal of Computer Security, 2009.
[3]
M. Y. Becker and P. Sewell. Cassandra: Distributed access control policies with tunable expressiveness. In Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, pages 159--168, June 2004.
[4]
B. K. Bhargava and Y. Zhong. Authorization based on evidence and trust. In International Conference on Data Warehousing and Knowledge Discovery, pages 94--103, Aix-en-Provence, France, Sept. 2002.
[5]
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proceedings of the IEEE Conference on Security and Privacy, pages 164--173, May 1996.
[6]
M. Blaze, J. Feigenbaum, and M. Strauss. Compliance checking in the PolicyMaker trust management system. In Proceedings of the Second International Conference on Financial Cryptography, number 1465 in Lecture Notes in Computer Science, pages 254--274. Springer, Feb. 1998.
[7]
P. Bonatti, C. Duma, D. Olmedilla, and N. Shahmehri. An integration of reputation-based and policy-based trust management. In Sematic Web and Policy Workshop, Galway, Ireland, Nov. 2005.
[8]
K. Borders, X. Zhao, and A. Prakash. CPOL: High-performance policy evaluation. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS), pages 147--157, Nov. 2005.
[9]
B. Carminati, E. Ferrari, and A. Perego. Enforcing access control in web-based social networks. ACM Transactions in Information and System Security. to appear.
[10]
B. Carminati, E. Ferrari, and A. Perego. A decentralized security framework for web-based social networks. International Journal of Information Security and Privacy, 2(4):22--53, 2008.
[11]
S. D. C. di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Trust management services in relational databases. In Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS), pages 149--160, Mar. 2007.
[12]
T. Jim. SD3: A trust management system with certified evaluation. In Proceedings of the IEEE Symposium on Security and Privacy, pages 106--115, May 2001.
[13]
A. Josang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online service provision. Decis. Support Syst., 43(2):618--644, 2007.
[14]
S. Kamvar, M. Schlosser, and H. Garcia-Molina. EigenRep: Reputation Management in P2P Networks. In Twelfth International World Wide Web Conference, 2003.
[15]
A. J. Lee, K. Minami, and N. Borisov. Confidentiality-preserving distributed proofs of conjunctive queries. In ACM Symposium on Information, Computer, and Communication Security (ASIACCS), Mar. 2009.
[16]
A. J. Lee and M. Winslett. Enforcing safety and consistency constraints in policy-based authorization systems. ACM Transactions on Information and System Security, 12(2), Dec. 2008.
[17]
A. J. Lee and M. Winslett. Towards an efficient and language-agnostic compliance checker for trust negotiation systems. In Proceedings of the 3rd ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008), pages 228--239, Mar. 2008.
[18]
A. J. Lee and T. Yu. Towards a dynamic and composite model of trust. In Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT), pages 217--226, June 2009.
[19]
J. Li, N. Li, and W. H. Winsborough. Automated trust negotiation using cryptographic credentials. In Proceedings of the ACM Conference on Computer and Communications Security, pages 46--57, Nov. 2005.
[20]
N. Li and J. C. Mitchell. RT: A role-based trust-management framework. In Proceedings of the Third DARPA Information Survivability Conference and Exposition (DISCEX III), pages 201--212, Apr. 2003.
[21]
N. Li, J. C. Mitchell, and W. H. Winsborough. Beyond proof-of-compliance: security analysis in trust management. Journal of the ACM, 52(3):474--514, 2005.
[22]
N. Li, W. Winsborough, and J. Mitchell. Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security, 11(1), Feb. 2003.
[23]
N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35--86, 2003.
[24]
K. Minami and D. Kotz. Secure context-sensitive authorization. Journal of Pervasive and Mobile Computing (PMC), 1(1):123--156, Mar. 2005.
[25]
I. Molloy, N. Li, T. Li, Z. Mao, Q. Wang, and J. Lobo. Evaluating role mining algorithms. In Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT), pages 95--104, 2009.
[26]
J. Vaidya, V. Atluri, and J. Warner. Roleminer: mining roles using subset enumeration. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), pages 144--153, 2006.
[27]
W. H. Winsborough, K. E. Seamons, and V. E. Jones. Automated trust negotiation. In DARPA Information Survivability Conference and Exposition, Jan. 2000.
[28]
L. Xiong and L. Liu. A reputation based trust model for peer-to-peer ecommerce communities. In IEEE International Conference on E-Commerce (CEC), 2003.
[29]
T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies in automated trust negotiation. ACM Transaction on Information and System Security (TISSEC), 6(1):1--42, Feb. 2003.
[30]
C. C. Zhang and M. Winslett. Distributed authorization by multiparty trust negotiation. In ESORICS 2008, pages 282--299, Oct. 2008.

Cited By

View all
  • (2016)Managing Evolving Trust Policies within Open and Decentralized Communities2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI)10.1109/WI.2016.0119(668-673)Online publication date: Oct-2016
  • (2015)Evaluating the Degree of Trust Under Context Sensitive Relational Database Hierarchy Using Hybrid Intelligent ApproachInternational Journal of Rough Sets and Data Analysis10.4018/ijrsda.20150101012:1(1-21)Online publication date: 1-Jan-2015
  • (2012)PlexCProceedings of the 17th ACM symposium on Access Control Models and Technologies10.1145/2295136.2295174(219-228)Online publication date: 20-Jun-2012
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIACCS '10: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
April 2010
363 pages
ISBN:9781605589367
DOI:10.1145/1755688
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 April 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. credentials
  2. databases
  3. policy
  4. reputation
  5. trust

Qualifiers

  • Research-article

Funding Sources

Conference

ASIA CCS '10
Sponsor:

Acceptance Rates

ASIACCS '10 Paper Acceptance Rate 25 of 166 submissions, 15%;
Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)1
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2016)Managing Evolving Trust Policies within Open and Decentralized Communities2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI)10.1109/WI.2016.0119(668-673)Online publication date: Oct-2016
  • (2015)Evaluating the Degree of Trust Under Context Sensitive Relational Database Hierarchy Using Hybrid Intelligent ApproachInternational Journal of Rough Sets and Data Analysis10.4018/ijrsda.20150101012:1(1-21)Online publication date: 1-Jan-2015
  • (2012)PlexCProceedings of the 17th ACM symposium on Access Control Models and Technologies10.1145/2295136.2295174(219-228)Online publication date: 20-Jun-2012
  • (2011)Social-Compliance in Trust Management within Virtual CommunitiesProceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 0310.1109/WI-IAT.2011.212(322-325)Online publication date: 22-Aug-2011

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media