2011
DOI: 10.1007/978-3-642-22348-8_9
|View full text |Cite
|
Sign up to set email alerts
|

Dynamics in Delegation and Revocation Schemes: A Logical Approach

Abstract: Abstract. In this paper we first introduce a logic for describing formally a family of delegation and revocation models that are based on the work in Hagström et al.. We then extend our logic to accommodate an epistemic interpretation of trust within the framework that we define. What emerges from this work is a rich framework of formally well-defined delegation and revocation schemes that accommodates an important trust component.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(23 citation statements)
references
References 14 publications
0
23
0
Order By: Relevance
“…1 As many of these problems amount to a principal having access right in a situation where the intended meaning of the used revocation scheme implies that the principal should not have access right, these problems can pose security risks.…”
Section: Problems With Hagström Et Al's Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…1 As many of these problems amount to a principal having access right in a situation where the intended meaning of the used revocation scheme implies that the principal should not have access right, these problems can pose security risks.…”
Section: Problems With Hagström Et Al's Frameworkmentioning
confidence: 99%
“…Depending on the reasons for the revocation, different ways to treat the delegation chain can be desirable [11,1,7]. For example, if one is revoking a permission given to an employee because he is moving to another position in the company, it makes sense to keep in place the permissions she previously granted; but if one is revoking a permission from a user who has abused his rights and is hence distrusted, it makes sense to delete the permissions she previously issued.…”
Section: Introductionmentioning
confidence: 99%
“…The behaviour of weak negative authorizations is clear and does not pose any of the problems discussed below. So in our discussion, we will focus on revocation schemes that are called strong by Hagström et al [10] and Aucher et al [1] and called predecessor-takes-precedence (p-t-p) by Cramer et al [6]. The problems discussed below apply equally to global and local revocation schemes; for the sake of simplicity, we will concentrate on global revocation schemes in this paper.…”
Section: Revocation Via Negative Authorizationmentioning
confidence: 99%
“…So for the rest of the paper, the only revocation scheme we consider is what Hagström et al [10] and Aucher et al [1] call a Strong Global Negative revocation, and what Cramer et al [6] call a P-t-p Global Resilient revocation.…”
Section: Revocation Via Negative Authorizationmentioning
confidence: 99%
See 1 more Smart Citation