Maintaining control while delegating trust: Integrity constraints in trust management

  • Authors:
  • Sandro Etalle;William H. Winsborough

  • Affiliations:
  • University of Twente;University of Texas at San Antonio

  • Venue:
  • ACM Transactions on Information and System Security (TISSEC)
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then, we address the fact that not all participants in a trust-management system can be trusted to assist in such monitoring, and show how many integrity constraints can be monitored in a conservative manner so that trusted participants detect and report if the system enters a policy state from which evolution in unmonitored portions of the policy could lead to a constraint violation.