Distributed Proving in Access-Control Systems

2005 IEEE Symposium on Security and Privacy, Proceedings(2005)

引用 149|浏览0
暂无评分
摘要
We present a distributed algorithm for assembling a proof that a request satisfies an access-control policy expressed in a formal logic, in the tradition of Lampson et al. (1992). We show analytically that our distributed proof-generation algorithm succeeds in assembling a proof whenever a centralized prover utilizing remote certificate retrieval would do so. In addition, we show empirically that our algorithm outperforms centralized approaches in various measures of performance and usability notably the number of remote requests and the number of user interruptions. We show that when combined with additional optimizations including caching and automatic tactic generation, which we introduce here, our algorithm retains its advantage, while achieving practical performance. Finally, we briefly describe the utilization of these algorithms as the basis for an access-control framework being deployed for use at our institution.
更多
查看译文
关键词
program behavior,errant task,host-based intrusion detection system,access-control systems,behavior validation on-the-fly,expected pattern,access control,authorisation,satisfiability,distributed algorithm,algorithm design and analysis,logic,assembly,generic algorithm,performance,computer science,usability,distributed algorithms,formal logic
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要