Compliance checking for usage-constrained credentials in trust negotiation systems
| Author | Hu, Jinwei |
| Author | Khan, Khaled M. |
| Author | Bai, Yun |
| Author | Zhang, Yan |
| Available date | 2024-04-02T06:04:50Z |
| Publication Date | 2012 |
| Publication Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
| Resource | Scopus |
| ISSN | 3029743 |
| Abstract | We propose an approach to placing usage-constraints on RT credentials; issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of practical interest. We present a compliance checker in the presence of usage-constraints, especially for trust negotiation systems. Given an RT policy, the checker is able to find all minimal satisfying sets, each of which uses credentials in a way consistent with given constraints. The checker leverages answer set programming, a declarative logic programming paradigm, to model and solve the problem. We also show preliminary experimental results: supporting usage-constraints on credentials incurs affordable overheads and the checker responds efficiently. |
| Language | en |
| Publisher | Springer Berlin Heidelberg |
| Subject | Answer set programming Compliance checking Declarative logic Nondeterministic finite automaton Programming paradigms Trust negotiations Automata theory Logic programming Security of data Model checking |
| Type | Conference |
| Pagination | 290-305 |
| Volume Number | 7483 LNCS |
Files in this item
| Files | Size | Format | View |
|---|---|---|---|
|
There are no files associated with this item. |
|||
This item appears in the following Collection(s)
-
Computer Science & Engineering [2519 items ]

