Integrity constraints in trust management

  • Authors:
  • Sandro Etalle;William H. Winsborough

  • Affiliations:
  • University of Twente;George Mason University

  • Venue:
  • Proceedings of the tenth ACM symposium on Access control models and technologies
  • Year:
  • 2005

Quantified Score

Hi-index 0.01

Visualization

Abstract

We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then we address the fact that not all participants in a trust management system can be trusted to assist in such monitoring, and show how many integrity constraints can be monitored in a conservative manner so that trusted participants detect and report if the system enters a policy state from which evolution in unmonitored portions of the policy could lead to a constraint violation.