Distributed credential chain discovery in trust management: extended abstract

  • Authors:
  • Ninghui Li;William H. Winsborough;John C. Mitchell

  • Affiliations:
  • Stanford University, Stanford, CA;Network Associates, Inc., Glenwood, MD;Stanford University, Stanford, CA

  • Venue:
  • CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

We give goal-oriented algorithms for discovering credential chains in RTo, a role-based trust-management language introduced in this paper. The algorithms search credential graphs, a representation of RTo credentials. We prove that evaluation based on reachability in credential graphs is sound and complete with respect to the set-theoretic semantics of RTo . RTo is more expressive than SDSI 2.0, so our algorithms can perform chain discovery in SDSI 2.0, for which existing algorithms in the literature either are not goal-oriented or require using specialized logic-programming inferencing engines. Being goal-oriented enables our algorithms to be used when credential storage is distributed. We introduce a type system for credential storage that guarantees well-typed, distributed credential chains can be discovered.