Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

On the consistency of distributed proofs with hidden subtrees

Lee, AJ and Minami, K and Winslett, M (2010) On the consistency of distributed proofs with hidden subtrees. ACM Transactions on Information and System Security, 13 (3). ISSN 1094-9224

[img] Plain Text (licence)
Available under License : See the attached license file.

Download (1kB)

Abstract

Previous work has shown that distributed authorization systems that fail to sample a consistent snapshot of the underlying system during policy evaluation are vulnerable to a number of attacks. Unfortuantely, the consistency enforcement solutions presented in previous work were designed for systems in which only CA-certified evidence is used during the decision-making process, all of which is available to the decision-making node at runtime. In this article, we generalize previous results and present light-weight mechanisms through which consistency constraints can be enforced in proof systems in which the full details of a proof may be unavailable to the querier due to information release policies, and the existence of certificate authorities for certifying evidence is unlikely; these types of distributed proof systems are likely candidates for use in pervasive computing and sensor network environments. We present modifications to one such distributed proof system that enable three types of consistency constraints to be enforced while still respecting the same confidentiality and integrity policies as the original proof system. We then discuss how these techniques can be adapted and applied to other, less restrictive, distributed proof systems. Further, we detail a performance analysis that illustrates the modest overheads of our consistency enforcement schemes. © 2010 ACM.


Share

Citation/Export:
Social Networking:
Share |

Details

Item Type: Article
Status: Published
Creators/Authors:
CreatorsEmailPitt UsernameORCID
Lee, AJadamlee@pitt.eduADAMLEE
Minami, K
Winslett, M
Date: 1 July 2010
Date Type: Publication
Journal or Publication Title: ACM Transactions on Information and System Security
Volume: 13
Number: 3
DOI or Unique Handle: 10.1145/1805974.1805981
Schools and Programs: Dietrich School of Arts and Sciences > Computer Science
Refereed: Yes
ISSN: 1094-9224
Date Deposited: 16 Nov 2012 21:29
Last Modified: 02 Feb 2019 16:56
URI: http://d-scholarship.pitt.edu/id/eprint/16450

Metrics

Monthly Views for the past 3 years

Plum Analytics

Altmetric.com


Actions (login required)

View Item View Item