RTT+ – Time Validity Constraints in RTT Language
Most of the traditional access control models, like mandatory, discretionary and role based access control make authorization decisions based on the identity, or the role of the requester, who must be known to the resource owner. Thus, they may be suitable for centralized systems but not for decentr...
Uložené v:
| Vydané v: | Journal of Telecommunications and Information Technology číslo 2 |
|---|---|
| Hlavní autori: | , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
National Institute of Telecommunications
30.06.2012
|
| Predmet: | |
| ISSN: | 1509-4553, 1899-8852 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Most of the traditional access control models, like mandatory, discretionary and role based access control make authorization decisions based on the identity, or the role of the requester, who must be known to the resource owner. Thus, they may be suitable for centralized systems but not for decentralized environments, where the requester and service provider or resource owner are often unknown to each other. To overcome the shortcomings of traditional access control models, trust management models have been presented. The topic of this paper is three different semantics (set-theoretic, operational, and logic- programming) of RTT , language from the family of role-based trust management languages (RT). RT is used for representing security policies and credentials in decentralized, distributed access control systems. A credential provides information about the privileges of users and the security policies issued by one or more trusted authorities. The set-theoretic semantics maps roles to a set of sets of entity names. Members of such a set must cooperate in order to satisfy the role. In the case of logic-programming semantics, the credentials are translated into a logic program. In the operational semantics the credentials can be established using a simple set of inference rules. It turns out to be fundamental mainly in large- scale distributed systems, where users have only partial view of their execution context. The core part of this paper is the introduction of time validity constraints to show how that can make RTT language more realistic. The new language, named RTT+ takes time validity constraints into account. The semantics for RTT+ language will also be shown. Inference system will be introduced not just for specific moment but also for time intervals. It will evaluate maximal time validity, when it is possible to derive the credential from the set of available credentials. The soundness and completeness of the inference systems with the time validity constraints with respect to the set-theoretic semantics of RTT+ will be proven. |
|---|---|
| AbstractList | Most of the traditional access control models, like mandatory, discretionary and role based access control make authorization decisions based on the identity, or the role of the requester, who must be known to the resource owner. Thus, they may be suitable for centralized systems but not for decentralized environments, where the requester and service provider or resource owner are often unknown to each other. To overcome the shortcomings of traditional access control models, trust management models have been presented. The topic of this paper is three different semantics (set-theoretic, operational, and logic- programming) of RTT , language from the family of role-based trust management languages (RT). RT is used for representing security policies and credentials in decentralized, distributed access control systems. A credential provides information about the privileges of users and the security policies issued by one or more trusted authorities. The set-theoretic semantics maps roles to a set of sets of entity names. Members of such a set must cooperate in order to satisfy the role. In the case of logic-programming semantics, the credentials are translated into a logic program. In the operational semantics the credentials can be established using a simple set of inference rules. It turns out to be fundamental mainly in large- scale distributed systems, where users have only partial view of their execution context. The core part of this paper is the introduction of time validity constraints to show how that can make RTT language more realistic. The new language, named RTT+ takes time validity constraints into account. The semantics for RTT+ language will also be shown. Inference system will be introduced not just for specific moment but also for time intervals. It will evaluate maximal time validity, when it is possible to derive the credential from the set of available credentials. The soundness and completeness of the inference systems with the time validity constraints with respect to the set-theoretic semantics of RTT+ will be proven. |
| Author | Adam Kozakiewicz Anna Felkner |
| Author_xml | – sequence: 1 fullname: Anna Felkner – sequence: 2 fullname: Adam Kozakiewicz |
| BookMark | eNotjM1Kw0AURgepYK19AHfZS-LcOzN3ZpZS_CkUBIluw81kUqa0iSRx0Z3v4Bv6JBZ19R0Oh-9SzLq-i0JcgyyQSNHtbkpTgRKwwAKQ7JmYg_M-d87g7MRG-lwboy7Echx3Ukr0ZCTiXOBLWd5k359fWZkOMXvjfWrSdMxWfTdOA6duGrPUZacq23C3_eBtvBLnLe_HuPzfhXh9uC9XT_nm-XG9utvkAQzYvCFGtjW5yKEBAhURZRucroOhOuoWDBsNEam1xpH22mAgqV1Qkmor1UKs_36bnnfV-5AOPByrnlP1K_phW_EwpbCPVbTUWA9gFLCO5F2w2BDJGjjWKLX6ARSkVMQ |
| ContentType | Journal Article |
| DBID | DOA |
| DOI | 10.26636/jtit.2012.2.1267 |
| DatabaseName | DOAJ Directory of Open Access Journals |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
| DeliveryMethod | fulltext_linktorsrc |
| EISSN | 1899-8852 |
| ExternalDocumentID | oai_doaj_org_article_e76d7911531a4e698c72d660b1aeb204 |
| GroupedDBID | ALMA_UNASSIGNED_HOLDINGS GROUPED_DOAJ P2P Y2W |
| ID | FETCH-LOGICAL-c1517-d6a2a7b68eacd1613e220fc84bc56be4f15a541e26f758649452c6048c306b703 |
| IEDL.DBID | DOA |
| ISSN | 1509-4553 |
| IngestDate | Fri Oct 03 12:51:54 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c1517-d6a2a7b68eacd1613e220fc84bc56be4f15a541e26f758649452c6048c306b703 |
| OpenAccessLink | https://doaj.org/article/e76d7911531a4e698c72d660b1aeb204 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_e76d7911531a4e698c72d660b1aeb204 |
| PublicationCentury | 2000 |
| PublicationDate | 2012-06-30 |
| PublicationDateYYYYMMDD | 2012-06-30 |
| PublicationDate_xml | – month: 06 year: 2012 text: 2012-06-30 day: 30 |
| PublicationDecade | 2010 |
| PublicationTitle | Journal of Telecommunications and Information Technology |
| PublicationYear | 2012 |
| Publisher | National Institute of Telecommunications |
| Publisher_xml | – name: National Institute of Telecommunications |
| SSID | ssj0002965022 |
| Score | 1.8166237 |
| Snippet | Most of the traditional access control models, like mandatory, discretionary and role based access control make authorization decisions based on the identity,... |
| SourceID | doaj |
| SourceType | Open Website |
| SubjectTerms | access control inference system with time constraints logic-programming semantics role-based trust management set-theoretic semantics |
| Title | RTT+ – Time Validity Constraints in RTT Language |
| URI | https://doaj.org/article/e76d7911531a4e698c72d660b1aeb204 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELVQxcCCQID4lgdWt4ljn-MREBUDqhAC1C3yp9QloDYw8x_4h_wSznGGbCys0SlKnnN37-zLPUKuosTQaJRlDgMfEwoss-Ajq3xp6soFpAC-F5tQi0W9XOrHkdRX6gnL44EzcLOgwCv0SPxWjAiga6e4ByhsabAozJNAC6VHxVSKwVwj8-iPEJDwaCakrPKRJuajCmaJ86W2Lj7l05InjfnRwP4-s8z3yO5ACel1fpR9shXaA8KfsNSmP1_fNP2kQV-RLnskzDQJbPayDt2GrlqKVvRh2HI8JC_zu-fbezboGzCHeVYxD4YjTFBj8PPIvKrAeRFdLayTYIOIpTRSlIFDRFYPQgvJHaDLOeT5Fl31iEzatzYcEwqu8gUyGYcWQhRRS6-D0XUMaIcl0Am5SS_YvOcRFk0aKt1fQKibAermL6hP_-MmZ2QnAZ9b7s7JpFt_hAuy7T671WZ92a_iL7I9nYU |
| linkProvider | Directory of Open Access Journals |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=RTT%2B+%E2%80%93+Time+Validity+Constraints+in+RTT+Language&rft.jtitle=Journal+of+Telecommunications+and+Information+Technology&rft.au=Anna+Felkner&rft.au=Adam+Kozakiewicz&rft.date=2012-06-30&rft.pub=National+Institute+of+Telecommunications&rft.issn=1509-4553&rft.eissn=1899-8852&rft.issue=2&rft_id=info:doi/10.26636%2Fjtit.2012.2.1267&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_e76d7911531a4e698c72d660b1aeb204 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1509-4553&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1509-4553&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1509-4553&client=summon |