Reasoning about Joint Administration of Access Policies for Coalition Resources

  • Authors:
  • Himanshu Khurana;Virgil Gligor;John Linn

  • Affiliations:
  • -;-;-

  • Venue:
  • ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

We argue that joint administration of access policies for a dynamic coalition formed by autonomous domains requires that these domains set up a coalition authority that distributes attribute certificates authorizing access to policy objects (e.g., ACLs). Control over the issuance of such certificates is retained by member domains separately holding shares of the joint coalition authority's private key with which they sign the attribute certificates. Hence, any (proper) subset of the member domains need not be trusted to protect the private key. However, application servers that implement joint administration of access policies based on attribute certificates must trust all the signers of those certificates, namely all member domains of the coalition. To capture these trust relations we extend existing access control logics and show that the extensions are sound. To reason about joint administration of access policies, we illustrate an authorization protocol in our logic for accessing policy objects using thresholdattribute certificates.