Distributed proving in access-control systems

被引:38
|
作者
Bauer, L [1 ]
Gartiss, S [1 ]
Reiter, MK [1 ]
机构
[1] Carnegie Mellon Univ, CyLab, Pittsburgh, PA 15213 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/SP.2005.9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a distributed algorithm for assembling a proof that a request satisfies an access-control policy expressed in a formal logic, in the tradition of Lampson et al. [16]. We show analytically that our distributed proof-generation algorithm succeeds in assembling a proof whenever a centralized prover utilizing remote certificate retrieval would do so. In addition, we show empirically that our algorithm outperforms centralized approaches in various measures of performance and usability, notably the number of remote requests and the number of user interruptions. We show that when combined with additional optimizations including caching and automatic tactic generation, which we introduce here, our algorithm retains its advantage, while achieving practical performance. Finally, we briefly describe the utilization of these algorithms as the basis for an access-control framework being deployed for use at our institution.
引用
收藏
页码:81 / 95
页数:15
相关论文
共 50 条
  • [1] Efficient proving for practical distributed access-control systems
    Bauer, Lujo
    Garriss, Scott
    Reiter, Michael K.
    [J]. COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 19 - +
  • [2] A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    ABADI, M
    BURROWS, M
    LAMPSON, B
    PLOTKIN, G
    [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1993, 15 (04): : 706 - 734
  • [3] A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    ABADI, M
    BURROWS, M
    LAMPSON, B
    PLOTKIN, G
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1992, 576 : 1 - 23
  • [4] SPECIFYING DISCRETIONARY ACCESS-CONTROL POLICY FOR DISTRIBUTED SYSTEMS
    MOFFETT, J
    SLOMAN, M
    TWIDLE, K
    [J]. COMPUTER COMMUNICATIONS, 1990, 13 (09) : 571 - 580
  • [5] CONTEXT-DEPENDENT ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    STRACK, H
    LAM, KY
    [J]. COMPUTER SECURITY, 1993, 37 : 137 - 155
  • [6] AN INTEGRATED ACCESS-CONTROL IN HETEROGENEOUS DISTRIBUTED DATABASE-SYSTEMS
    KANG, S
    MOON, S
    [J]. MICROPROCESSING AND MICROPROGRAMMING, 1992, 35 (1-5): : 429 - 436
  • [7] DOMAIN-BASED ACCESS-CONTROL FOR DISTRIBUTED COMPUTING SYSTEMS
    ROBINSON, DC
    SLOMAN, MS
    [J]. SOFTWARE ENGINEERING JOURNAL, 1988, 3 (05): : 161 - 170
  • [8] ACCESS-CONTROL SYSTEMS FOR SECURITY
    MENKUS, B
    [J]. OFFICE ADMINISTRATION AND AUTOMATION, 1984, 45 (04): : 57 - &
  • [9] A COMPARISON OF CENTRALIZED VERSUS DISTRIBUTED ARCHITECTURES IN BIOMETRIC ACCESS-CONTROL SYSTEMS
    DRISCOLL, EC
    FOWLER, RC
    [J]. 1989 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 1989, : 193 - 198
  • [10] ACCESS-CONTROL AND SECURITY FOR A DISTRIBUTED CONTROL-SYSTEM
    MEYER, J
    GOTZ, A
    KLOTZ, WD
    [J]. NUCLEAR INSTRUMENTS & METHODS IN PHYSICS RESEARCH SECTION A-ACCELERATORS SPECTROMETERS DETECTORS AND ASSOCIATED EQUIPMENT, 1994, 352 (1-2): : 289 - 292