Logic for computer science: foundations of automatic theorem proving
Logic for computer science: foundations of automatic theorem proving
Composing and decomposing systems under security properties
CSFW '95 Proceedings of the 8th IEEE workshop on Computer Security Foundations
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Binder, a Logic-Based Security Language
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
A Logical Language for Expressing Authorizations
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
SD3: A Trust Management System with Certified Evaluation
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
On the composition of security properties
On the composition of security properties
Property-based attestation for computing platforms: caring about properties, not mechanisms
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
A protocol for property-based attestation
Proceedings of the first ACM workshop on Scalable trusted computing
Trust management for trusted computing platforms in web services
Proceedings of the 2007 ACM workshop on Scalable trusted computing
On the Applicability of Trusted Computing in Distributed Authorization Using Web Services
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Hi-index | 0.00 |
Property based attestation is an extension of the proposed trusted computing attestation mechanism where binary measurements are abstracted to meaningful platform properties. In this paper, we propose ALOPA - A uthorization Lo gic for P roperty A ttestation, a logic based language for the specification and evaluation of authorization policies using properties in trusted platforms. Access control policies specified using ALOPA govern the access of platforms to resources on the basis of the platform's identity and a collection of rules based on platform properties, which determine, for any platform and any resource, the types of accesses the platform is allowed on the resource. Such an approach seems promising for developing secure distributed applications using property attestation based authorization for trusted platforms.