skip to main content
10.1145/1066677.1066757acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Efficient support for enterprise delegation policies

Published: 13 March 2005 Publication History

Abstract

Delegation, whereby an entity gives some of its rights to other entities, is considered the cornerstone of decentralized authorization, and many access control frameworks proposed recently make delegation its central tenet. In these frameworks, delegation is commonly viewed as a transfer between two autonomous agents---the grantor and the grantee. But the situation can be considerably more complex, and more challenging, in the case the grantor belongs to an organization. Generally, employees are not autonomous agents, but their actions are subject to the regulations of their enterprise. In particular, if an employee transfers his rights to another agent, this transfer is subject to the enterprise delegation policies.In delegation frameworks, authorizing a request requires finding a valid chain of credentials that delegates the authority from the source (the local policy of the entity that serves the request) to the requester. Unfortunately, chain discovery is a computationally expensive and time consuming task. It was shown that, in the general case, chain discovery is undecidable, and in more restrictive cases, it is polynomial in the number of credentials available to the server. Verifying compliance with the terms of a delegation policy adds a considerable overhead to request authorization.This paper presents a framework that considerably reduces the time required to authorize a request. In this framework, a delegation chain is condensed into a single credential, called chained delegation certificate (CDC). A CDC attests that the owner has a certain right, and serves as proof that every link in the chain complies with the policy governing delegation of the right in question. When CDCs are used for authorization, a server does not need to verify compliance with the delegation policy, nor does it need to perform the chain discovery step, and therefore requests are served considerably faster.

References

[1]
T. Aura. Distributed access rights management with delegations certificates. In Secure Internet Programming, pages 211--235, 1999.]]
[2]
J. Bacon, K. Moody, and W. Yao. A model of Oasis role-based access control and its support for active security. ACM Transactions on Information and System Security (TISSEC), 5(4):492--540, November 2002.]]
[3]
O. Bandmann, M. Dam, and B. Firozabadi. Constrained delegations. In Proceedings of the IEEE Symposium in Security and Privacy, pages 131--140, Oakland, California, 2002.]]
[4]
M. Blaze, J. Feigenbaum, J. loannidis, and A. Keromytis. The role of trust management in distributed systems security. Secure Internet Programming: Issues in Distributed and Mobile Object Systems, 1603, 1999.]]
[5]
M. Blaze, J. Feigenbaum, and A. D. Keromytis. Keynote: Trust management for public-key infrastructures (position paper). In Security Protocols Workshop, pages 59--63, 1998.]]
[6]
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proceedings of the IEEE Symposium on Security and Privacy, May 1996.]]
[7]
M. Blaze, J. Feigenbaum, and M. Strauss. Compliance checking in the policymaker trust management system. In Financial Cryptography, pages 254--274, 1998.]]
[8]
D. Clarke, J. Elien, C. Ellison, M. Fredette, A. Morcos, and R. Rivest. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 9(4):285--322, 2001.]]
[9]
J. DeTreville. Binder, a logic-based security language. In Proceedings of the IEEE Symposium in Security and Privacy. IEEE Computer Society, 2002.]]
[10]
R. J. Hayton, J. M. Bacon, and K. Moody. Access control in an open distributed environment. In Proceedings of the IEEE Symposium on Security and Privacy, 1998.]]
[11]
S. loannidis, A. D. Keromytis, S. M. Bellovin, and J. M. Smith. Implementing a distributed firewall. In ACM Conference on Computer and Communications Security, pages 190--199, 2000.]]
[12]
Y. Kortesniemi. SPKI performance and certificate chain reduction. In GI Jahrestagung, pages 449--454, 2002.]]
[13]
N. Li, B. Grosof, and J. Feigenbaum. Delegation Logic: A logic-based approach to distributed authorization. ACM Transaction on Information and System Security (TISSEC), 6(1):128--171, February 2003.]]
[14]
N. Li, J. Mitchell, and W. Winsborough. Design of a role-based trust-management framework. In Proceedings of the IEEE Symposium in Security and Privacy, pages 114--130, 2002.]]
[15]
N. Li, W. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35--86, February 2003.]]
[16]
V. Ungureanu. Using certified policies to regulate e-commerce transactions. ACM Transactions on Internet Technologies, 5(1), February 2005.]]

Cited By

View all
  • (2009)Authorization through trust chains in ad hoc gridsProceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship10.1145/1551722.1551735(1-4)Online publication date: 3-Jun-2009

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '05: Proceedings of the 2005 ACM symposium on Applied computing
March 2005
1814 pages
ISBN:1581139640
DOI:10.1145/1066677
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 March 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. decentralized authorization
  2. delegation chain
  3. delegation policy

Qualifiers

  • Article

Conference

SAC05
Sponsor:
SAC05: The 2005 ACM Symposium on Applied Computing
March 13 - 17, 2005
New Mexico, Santa Fe

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2009)Authorization through trust chains in ad hoc gridsProceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship10.1145/1551722.1551735(1-4)Online publication date: 3-Jun-2009

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media