Independently Verifiable Decentralized Role-Based Delegation

被引:4
|
作者
Tamassia, Roberto
Yao, Danfeng [1 ]
Winsborough, William H. [2 ]
机构
[1] Virginia Polytech Inst & State Univ, Dept Comp Sci, Blacksburg, VA 24061 USA
[2] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA
基金
美国国家科学基金会;
关键词
Decentralized delegation; digital credentials; SYSTEM;
D O I
10.1109/TSMCA.2010.2045118
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In open systems such as cloud computing platforms, delegation transfers privileges among users across different administrative domains and facilitates information sharing. We present an independently verifiable delegation mechanism, where a delegation credential can be verified without the participation of domain administrators. Our protocol, called role-based cascaded delegation (RBCD), supports simple and efficient cross-domain delegation of authority. RBCD enables a role member to create delegations based on the dynamic needs of collaboration; in the meantime, a delegation chain can be verified by anyone without the participation of role administrators. We also describe an efficient realization of RBCD by using aggregate signatures, where the authentication information for an arbitrarily long role-based delegation chain is captured by one short signature of constant size.
引用
收藏
页码:1206 / 1219
页数:14
相关论文
共 50 条
  • [1] Delegation in a role-based organization
    Pacheco, O
    Santos, F
    DEONTIC LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2004, 3065 : 209 - 227
  • [2] Constrained role-based delegation
    Zhang, LH
    Ahn, GJ
    SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 289 - 300
  • [3] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    International Journal of Information Security, 2008, 7 : 123 - 136
  • [4] Role delegation in role-based access control
    Na, SangYeob
    Cheon, SuhHyun
    Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44
  • [5] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
  • [6] Role-based delegation with negative authorization
    Wang, H
    Cao, JL
    Ross, D
    FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS, 2006, 3841 : 307 - 318
  • [7] Framework for role-based delegation models
    Barka, E
    Sandhu, R
    16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 168 - 176
  • [8] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) : 123 - 136
  • [9] Role-based constraint hierarchy delegation model
    Liu Z.-T.
    Mao Y.-G.
    Wang J.-D.
    Ye C.-B.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2010, 39 (01): : 114 - 118
  • [10] Detecting conflicts in a role-based delegation model
    Schaad, A
    17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 117 - 126