Integrity Constraints in Trust Management

Sandro Etalle - Universita` di Twente, DIES: distributed and embedded system group
Date and time
Tuesday, May 10, 2005 at 5:30 PM - ore 17.00: te`, caffe` & C.
Ca' Vignal - Piramide, Floor 0, Hall Verde
Programme Director
Roberto Giacobazzi
External reference
Publication date
May 5, 2005


Abstract: We introduce the use, monitoring, and enforcement of
integrity constraints in trust management (TM) style authorizatio
systems. We show how this relates to the safety problem of TM. We
consider what portions of the policy state must be monitored to detect
violations of integrity constraints. Then we address the fact that not
all participants in a trust management system can be trusted to assist
in such monitoring, and show how many integrity constraints can be
monitored in a conservative manner so that trusted participants detect
and report if the system enters a policy state from which evolution in
unmonitored portions of the policy could lead to a constraint

Related areas: Logic and formal methods, languages, security and
safety analysis, access control.

© 2002 - 2021  Verona University
Via dell'Artigliere 8, 37129 Verona  |  P. I.V.A. 01541040232  |  C. FISCALE 93009870234