scispace - formally typeset
Book ChapterDOI

The role of trust management in distributed systems security

Reads0
Chats0
TLDR
The concept of trust management is introduced, its basic principles are explained, and some existing trust-management engines are described, including PoHcyMaker and KeyNote, which allow for increased flexibility and expressibility, as well as standardization of modern, scalable security mechanisms.
Abstract
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming under increasing strain from the development and deployment of systems that increase the programmability of the Internet. Moreover, this "increased flexibility through programmability" trend seems to be accelerating with the advent of proposals such as Active Networking and Mobile Agents. The trust-management approach to distributed-system security was developed as an answer to the inadequacy of traditional authorization mechanisms. Trust-management engines avoid the need to resolve "identities" in an authorization decision. Instead, they express privileges and restrictions in a programming language. This allows for increased flexibility and expressibility, as well as standardization of modern, scalable security mechanisms. Further advantages of the trust-management approach include proofs that requested transactions comply with local policies and system architectures that encourage developers and administrators to consider an application's security policy carefully and specify it explicitly. In this paper, we examine existing authorization mechanisms and their inadequacies. We introduce the concept of trust management, explain its basic principles, and describe some existing trust-management engines, including PoHcyMaker and KeyNote. We also report on our experience using trust-management engines in several distributed-system applications.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Review: A survey on security issues in service delivery models of cloud computing

TL;DR: A survey of the different security risks that pose a threat to the cloud is presented and a new model targeting at improving features of an existing model must not risk or threaten other important features of the current model.
Journal ArticleDOI

A survey of trust in internet applications

TL;DR: This survey examines the various definitions of trust in the literature and provides a working definition of trust for Internet applications and some influential examples of trust management systems.
Journal ArticleDOI

A survey of trust in computer science and the Semantic Web

TL;DR: This paper gives an overview of existing trust research in computer science and the Semantic Web.
Proceedings ArticleDOI

A reputation-based approach for choosing reliable resources in peer-to-peer networks

TL;DR: This work proposes a self-regulating system where the P2P network is used to implement a robust reputation mechanism, and a distributed polling algorithm by which resource requestors can assess the reliability of a resource offered by a participant before initiating the download.
References
More filters
Book

The Java Language Specification

TL;DR: The Java Language Specification, Second Edition is the definitive technical reference for the Java programming language and provides complete, accurate, and detailed coverage of the syntax and semantics of the Java language.

Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification

TL;DR: RSVP as discussed by the authors is a resource reservation setup protocol designed for an integrated services Internet that provides receiver-initiated setup of resource reservations for multicast or unicast data flows, with good scaling and robustness properties.
Proceedings ArticleDOI

Decentralized trust management

TL;DR: This paper presents a comprehensive approach to trust management, based on a simple language for specifying trusted actions and trust relationships, and describes a prototype implementation of a new trust management system, called PolicyMaker, that will facilitate the development of security features in a wide range of network services.
Proceedings ArticleDOI

Proof-carrying code

TL;DR: It is shown in this paper how proof-carrying code might be used to develop safe assembly-language extensions of ML programs and the adequacy of concrete representations for the safety policy, the safety proofs, and the proof validation is proved.

Host extensions for IP multicasting

S. E. Deering
TL;DR: This memo specifies the extensions required of a host implementation of the Internet Protocol to support multicasting and obsoletes RFCs 998 and 1054.
Trending Questions (1)
How do traditional security mechanisms perform in distributed environments, and where do they fall short?

Traditional security mechanisms, such as ACLs and identity-based public-key systems, are inadequate for distributed environments due to issues with authentication, extensibility, expressibility, and delegation.