Privacy preserving credential verification for non-monotonic trust management systems

被引:0
|
作者
Dong, Changyu [1 ]
Russello, Giovanni [1 ]
Dulay, Naranker [1 ]
机构
[1] Imperial Coll London, Dept Comp, London SW7 2AZ, England
基金
英国工程与自然科学研究理事会;
关键词
rust management; non-monotonic policy; privacy; cryptography;
D O I
10.1007/978-3-540-73986-9_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Trust management systems provide a flexible way for performing decentralized security management. However, most trust management systems only support monotonic policies. Compared with non-monotonic policies, monotonic ones are less flexible and cannot express policies such as "Chinese wall policies" and "separation of duties". To support non-monotonic policies, trust management systems must be able to correctly identify the credentials which a subject has that are required by the policies. Previous efforts address the problem by letting the system query the issuers directly to verify the possession status of the credentials. But this approach can violate the subject's privacy. The main contribution of this paper is a cryptographic credential verification scheme for non-monotonic trust management systems that can correctly identify the credentials that a subject has while also protecting the subject's privacy. We also analyze the security of the scheme and prove that with correct construction and certain cryptographic assumptions, the scheme is secure.
引用
收藏
页码:171 / +
页数:4
相关论文
共 50 条
  • [1] Shinren: Non-monotonic Trust Management for Distributed Systems
    Dong, Changyu
    Dulay, Naranker
    TRUST MANAGEMENT IV, 2010, 321 : 125 - 140
  • [2] Verification of non-monotonic knowledge bases
    Zlatareva, NP
    DECISION SUPPORT SYSTEMS, 1997, 21 (04) : 253 - 261
  • [3] Privacy-preserving Trust Verification
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    Shafiq, Basit
    Adam, Nabil
    SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2010, : 139 - 148
  • [4] Preserving Contract Satisfiability Under Non-monotonic Composition
    Westman, Jonas
    Nyberg, Mattias
    FORMAL TECHNIQUES FOR DISTRIBUTED OBJECTS, COMPONENTS, AND SYSTEMS, FORTE 2018, 2018, 10854 : 181 - 195
  • [5] Privacy Preserving Data Mining within Anonymous Credential Systems
    Kiayias, Aggelos
    Xu, Shouhuai
    Yung, Moti
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 57 - +
  • [6] Anonymous Credential-Based Privacy-Preserving Identity Verification for Business Processes
    Guo, Nan
    Jin, Yuanting
    Yim, Kangbin
    2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2014, : 554 - 559
  • [7] An Improved Non-Monotonic Adaptive Trust Region Algorithm for Unconstrained Optimization
    Xu, Mingming
    Zhu, Quanxin
    Xiao, Hongying
    MATHEMATICS, 2024, 12 (21)
  • [8] Trust Management In Privacy - Preserving Information System
    Peng, Kun
    Bao, Feng
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 7, 2010, : 1 - 4
  • [9] Verification of mesoscopic models of viscoelastic fluids with a non-monotonic flow curve
    Kuznetsova, Julia L.
    Skul'skiy, Oleg I.
    KOREA-AUSTRALIA RHEOLOGY JOURNAL, 2016, 28 (01) : 33 - 40
  • [10] Issues in parallel execution of non-monotonic reasoning systems
    Balduccini, M
    Pontelli, E
    Elkhatib, O
    Le, H
    PARALLEL COMPUTING, 2005, 31 (06) : 608 - 647