Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees

Lee, AJ and Minami, K and Winslett, M (2007) Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees. In: UNSPECIFIED UNSPECIFIED, 101 - 110. ISBN 1595937455, 9781595937452

[img] Plain Text (licence)
Available under License : See the attached license file.

Download (1kB)

Abstract

In distributed proof construction systems, information release policies can make it unlikely that any single node in the system is aware of the complete structure of any particular proof tree. This property makes it difficult for queriers to determine whether the proofs constructed using these protocols sampled a consistent snapshot of the system state; this has previously been shown to have dire consequences in decentralized authorization systems. Unfortunately, the consistency enforcement solutions presented in previous work were designed for systems in which only information encoded in certificates issued by certificate authorities is used during the decision-making process. Further, they assume that each piece of certified evidence used during proof construction is available to the decision-making node at runtime. In this paper, we generalize these previous results and present lightweight mechanisms through which consistency constraints can be enforced in proof systems in which the full details of a proof may be unavailable to the querier and the existence of certificate authorities for certifying evidence is unlikely; these types of distributed proof systems are likely candidates for use in pervasive computing and sensor network environments. We present modifications to one such distributed proof system that enable two types of consistency constraints to be enforced while still respecting the same confidentiality and integrity policies as the original proof system. Further, we detail a performance analysis that illustrates the modest overheads of our consistency enforcement schemes. Copyright 2007 ACM.


Share

Citation/Export:
Social Networking:
Share |

Details

Item Type: Book Section
Status: Published
Creators/Authors:
CreatorsEmailPitt UsernameORCID
Lee, AJadamlee@pitt.eduADAMLEE
Minami, K
Winslett, M
Date: 24 August 2007
Date Type: Publication
Journal or Publication Title: Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
Page Range: 101 - 110
Event Type: Conference
DOI or Unique Handle: 10.1145/1266840.1266856
Schools and Programs: Dietrich School of Arts and Sciences > Computer Science
Refereed: Yes
ISBN: 1595937455, 9781595937452
Date Deposited: 05 Dec 2012 19:26
Last Modified: 30 Mar 2019 14:55
URI: http://d-scholarship.pitt.edu/id/eprint/16504

Metrics

Monthly Views for the past 3 years

Plum Analytics

Altmetric.com


Actions (login required)

View Item View Item