【24h】

Toward Practical Analysis for Trust Management Policy

机译:进行信任管理政策的实践分析

获取原文
获取原文并翻译 | 示例

摘要

Trust management is a scalable and flexible form of access control that relies heavily on delegation techniques. While these techniques may be necessary in large or decentralized systems, stakeholders need an analysis methodology and automated tools for reasoning about who will have access to their resources today as well as in the future. When an access control policy fails to satisfy the policy author's security objectives, tools should provide information that demonstrate how and why the failure occurred. Such information is useful in that it may assist policy authors in constructing policies that satisfy security objectives, which support policy authoring and maintenance. This paper presents a collection of reduction, optimization, and verification techniques useful in determining whether security properties are satisfied by RT policies. We provide proofs of correctness as well as demonstrate the degree of effectiveness and efficiency the techniques provide through empirical evaluation. While the type of analysis problem we examine is generally intractable, we demonstrate that our reduction and optimization techniques may be able to reduce problem instances into a form that can be automatically verified.
机译:信任管理是访问控制的可扩展且灵活的形式,它严重依赖于委托技术。尽管在大型或分散式系统中可能需要使用这些技术,但是利益相关者需要一种分析方法和自动化工具来推理谁将在今天以及将来可以使用他们的资源。当访问控制策略无法满足策略作者的安全性目标时,工具应提供信息,以证明失败发生的方式和原因。这样的信息很有用,因为它可以帮助策略创建者构建满足安全目标的策略,从而支持策略编写和维护。本文介绍了减少,优化和验证技术的集合,这些技术可用于确定RT策略是否满足安全属性。我们提供正确性证明,并通过经验评估证明该技术提供的有效性和效率。虽然我们检查的分析问题的类型通常很难解决,但我们证明了我们的减少和优化技术可以将问题实例减少为可以自动验证的形式。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号