Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/829514.830539guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Design of a Role-Based Trust-Management Framework

Published: 12 May 2002 Publication History
  • Get Citation Alerts
  • Abstract

    We introduce the RT framework, a family of Role-based Trust-managementlanguages for representing policies and credentials in distributedauthorization. RT combines the strengths of role-based access controland trust-management systems and is especially suitable forattribute-based access control. Using a few simple credential forms, RTprovides localized authority over roles, delegation in role definition,linked roles, and parameterized roles. RT also introduces manifoldroles, which can be used to express threshold and separation-of-dutypolicies, and delegation of role activations. We formally define thesemantics of credentials in the RT framework by presenting a translationfrom credentials to Datalog rules.This translation also shows thatthis semantics is algorithmically tractable.

    Cited By

    View all
    • (2023)No Root Store Left BehindProceedings of the 22nd ACM Workshop on Hot Topics in Networks10.1145/3626111.3630268(295-301)Online publication date: 28-Nov-2023
    • (2020)Shattered chain of trustProceedings of the 29th USENIX Conference on Security Symposium10.5555/3489212.3489279(1183-1200)Online publication date: 12-Aug-2020
    • (2019)WAVEProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361434(1375-1392)Online publication date: 14-Aug-2019
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    SP '02: Proceedings of the 2002 IEEE Symposium on Security and Privacy
    May 2002
    ISBN:0769515436

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 12 May 2002

    Author Tags

    1. access control
    2. attribute certificates
    3. attribute-based access control
    4. distributed system security
    5. role-based access control
    6. trust management

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)No Root Store Left BehindProceedings of the 22nd ACM Workshop on Hot Topics in Networks10.1145/3626111.3630268(295-301)Online publication date: 28-Nov-2023
    • (2020)Shattered chain of trustProceedings of the 29th USENIX Conference on Security Symposium10.5555/3489212.3489279(1183-1200)Online publication date: 12-Aug-2020
    • (2019)WAVEProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361434(1375-1392)Online publication date: 14-Aug-2019
    • (2018)Automated Coverage-Based Testing of XACML PoliciesProceedings of the 23nd ACM on Symposium on Access Control Models and Technologies10.1145/3205977.3205979(3-14)Online publication date: 7-Jun-2018
    • (2018)Logic programming applicationsDeclarative Logic Programming10.1145/3191315.3191326(519-548)Online publication date: 1-Sep-2018
    • (2018)STORKInternational Journal of Information Security10.1007/s10207-017-0385-x17:5(569-585)Online publication date: 1-Oct-2018
    • (2017)WatchITProceedings of the 26th Symposium on Operating Systems Principles10.1145/3132747.3132752(515-530)Online publication date: 14-Oct-2017
    • (2016)Authorizing Network Control at Software Defined Internet Exchange PointsProceedings of the Symposium on SDN Research10.1145/2890955.2890956(1-6)Online publication date: 14-Mar-2016
    • (2016)AppPAL for AndroidProceedings of the 8th International Symposium on Engineering Secure Software and Systems - Volume 963910.1007/978-3-319-30806-7_14(216-232)Online publication date: 6-Apr-2016
    • (2015)Authentication and authorization in FELIXProceedings of the 8th International Conference on Utility and Cloud Computing10.5555/3233397.3233507(553-558)Online publication date: 7-Dec-2015
    • Show More Cited By

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media