Abductive authorization credential gathering

  • Authors:
  • Moritz Y. Becker;Jason F. Mackay;Blair Dillaway

  • Affiliations:
  • Microsoft Research, Cambridge, UK;Microsoft Corporation, Redmond, WA;Microsoft Corporation, Redmond, WA

  • Venue:
  • POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

A central task in the context of logic-based decentralized authorization languages is that of gathering credentials from credential providers, required by the resource guard's policy to grant a user's access request. This paper presents an abduction-based algorithm that computes a specification of missing credentials without communicating with remote credential providers. The specification is used to gather credentials from credential providers in a single pass, without involving any communication with the resource guard. The credentials gathered thus are pushed to the resource guard at authorization time. This approach decouples authorization from credential gathering, and, in compprison to server-side pull methods, reduces the number of messqges sent between participants, and allows for environments iTt which some credential providers are unknown or unavailable to the resource guard at authorization time.