RTT+ – Time Validity Constraints in RTT Language

Most of the traditional access control models, like mandatory, discretionary and role based access control make authorization decisions based on the identity, or the role of the requester, who must be known to the resource owner. Thus, they may be suitable for centralized systems but not for decentr...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Journal of Telecommunications and Information Technology číslo 2
Hlavní autori: Anna Felkner, Adam Kozakiewicz
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: National Institute of Telecommunications 30.06.2012
Predmet:
ISSN:1509-4553, 1899-8852
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Most of the traditional access control models, like mandatory, discretionary and role based access control make authorization decisions based on the identity, or the role of the requester, who must be known to the resource owner. Thus, they may be suitable for centralized systems but not for decentralized environments, where the requester and service provider or resource owner are often unknown to each other. To overcome the shortcomings of traditional access control models, trust management models have been presented. The topic of this paper is three different semantics (set-theoretic, operational, and logic- programming) of RTT , language from the family of role-based trust management languages (RT). RT is used for representing security policies and credentials in decentralized, distributed access control systems. A credential provides information about the privileges of users and the security policies issued by one or more trusted authorities. The set-theoretic semantics maps roles to a set of sets of entity names. Members of such a set must cooperate in order to satisfy the role. In the case of logic-programming semantics, the credentials are translated into a logic program. In the operational semantics the credentials can be established using a simple set of inference rules. It turns out to be fundamental mainly in large- scale distributed systems, where users have only partial view of their execution context. The core part of this paper is the introduction of time validity constraints to show how that can make RTT language more realistic. The new language, named RTT+ takes time validity constraints into account. The semantics for RTT+ language will also be shown. Inference system will be introduced not just for specific moment but also for time intervals. It will evaluate maximal time validity, when it is possible to derive the credential from the set of available credentials. The soundness and completeness of the inference systems with the time validity constraints with respect to the set-theoretic semantics of RTT+ will be proven.
AbstractList Most of the traditional access control models, like mandatory, discretionary and role based access control make authorization decisions based on the identity, or the role of the requester, who must be known to the resource owner. Thus, they may be suitable for centralized systems but not for decentralized environments, where the requester and service provider or resource owner are often unknown to each other. To overcome the shortcomings of traditional access control models, trust management models have been presented. The topic of this paper is three different semantics (set-theoretic, operational, and logic- programming) of RTT , language from the family of role-based trust management languages (RT). RT is used for representing security policies and credentials in decentralized, distributed access control systems. A credential provides information about the privileges of users and the security policies issued by one or more trusted authorities. The set-theoretic semantics maps roles to a set of sets of entity names. Members of such a set must cooperate in order to satisfy the role. In the case of logic-programming semantics, the credentials are translated into a logic program. In the operational semantics the credentials can be established using a simple set of inference rules. It turns out to be fundamental mainly in large- scale distributed systems, where users have only partial view of their execution context. The core part of this paper is the introduction of time validity constraints to show how that can make RTT language more realistic. The new language, named RTT+ takes time validity constraints into account. The semantics for RTT+ language will also be shown. Inference system will be introduced not just for specific moment but also for time intervals. It will evaluate maximal time validity, when it is possible to derive the credential from the set of available credentials. The soundness and completeness of the inference systems with the time validity constraints with respect to the set-theoretic semantics of RTT+ will be proven.
Author Adam Kozakiewicz
Anna Felkner
Author_xml – sequence: 1
  fullname: Anna Felkner
– sequence: 2
  fullname: Adam Kozakiewicz
BookMark eNotjM1Kw0AURgepYK19AHfZS-LcOzN3ZpZS_CkUBIluw81kUqa0iSRx0Z3v4Bv6JBZ19R0Oh-9SzLq-i0JcgyyQSNHtbkpTgRKwwAKQ7JmYg_M-d87g7MRG-lwboy7Echx3Ukr0ZCTiXOBLWd5k359fWZkOMXvjfWrSdMxWfTdOA6duGrPUZacq23C3_eBtvBLnLe_HuPzfhXh9uC9XT_nm-XG9utvkAQzYvCFGtjW5yKEBAhURZRucroOhOuoWDBsNEam1xpH22mAgqV1Qkmor1UKs_36bnnfV-5AOPByrnlP1K_phW_EwpbCPVbTUWA9gFLCO5F2w2BDJGjjWKLX6ARSkVMQ
ContentType Journal Article
DBID DOA
DOI 10.26636/jtit.2012.2.1267
DatabaseName DOAJ Directory of Open Access Journals
DatabaseTitleList
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
EISSN 1899-8852
ExternalDocumentID oai_doaj_org_article_e76d7911531a4e698c72d660b1aeb204
GroupedDBID ALMA_UNASSIGNED_HOLDINGS
GROUPED_DOAJ
P2P
Y2W
ID FETCH-LOGICAL-c1517-d6a2a7b68eacd1613e220fc84bc56be4f15a541e26f758649452c6048c306b703
IEDL.DBID DOA
ISSN 1509-4553
IngestDate Fri Oct 03 12:51:54 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c1517-d6a2a7b68eacd1613e220fc84bc56be4f15a541e26f758649452c6048c306b703
OpenAccessLink https://doaj.org/article/e76d7911531a4e698c72d660b1aeb204
ParticipantIDs doaj_primary_oai_doaj_org_article_e76d7911531a4e698c72d660b1aeb204
PublicationCentury 2000
PublicationDate 2012-06-30
PublicationDateYYYYMMDD 2012-06-30
PublicationDate_xml – month: 06
  year: 2012
  text: 2012-06-30
  day: 30
PublicationDecade 2010
PublicationTitle Journal of Telecommunications and Information Technology
PublicationYear 2012
Publisher National Institute of Telecommunications
Publisher_xml – name: National Institute of Telecommunications
SSID ssj0002965022
Score 1.8166237
Snippet Most of the traditional access control models, like mandatory, discretionary and role based access control make authorization decisions based on the identity,...
SourceID doaj
SourceType Open Website
SubjectTerms access control
inference system with time constraints
logic-programming semantics
role-based trust management
set-theoretic semantics
Title RTT+ – Time Validity Constraints in RTT Language
URI https://doaj.org/article/e76d7911531a4e698c72d660b1aeb204
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELVQxcCCQID4lgdWt4ljn-MREBUDqhAC1C3yp9QloDYw8x_4h_wSznGGbCys0SlKnnN37-zLPUKuosTQaJRlDgMfEwoss-Ajq3xp6soFpAC-F5tQi0W9XOrHkdRX6gnL44EzcLOgwCv0SPxWjAiga6e4ByhsabAozJNAC6VHxVSKwVwj8-iPEJDwaCakrPKRJuajCmaJ86W2Lj7l05InjfnRwP4-s8z3yO5ACel1fpR9shXaA8KfsNSmP1_fNP2kQV-RLnskzDQJbPayDt2GrlqKVvRh2HI8JC_zu-fbezboGzCHeVYxD4YjTFBj8PPIvKrAeRFdLayTYIOIpTRSlIFDRFYPQgvJHaDLOeT5Fl31iEzatzYcEwqu8gUyGYcWQhRRS6-D0XUMaIcl0Am5SS_YvOcRFk0aKt1fQKibAermL6hP_-MmZ2QnAZ9b7s7JpFt_hAuy7T671WZ92a_iL7I9nYU
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=RTT%2B+%E2%80%93+Time+Validity+Constraints+in+RTT+Language&rft.jtitle=Journal+of+Telecommunications+and+Information+Technology&rft.au=Anna+Felkner&rft.au=Adam+Kozakiewicz&rft.date=2012-06-30&rft.pub=National+Institute+of+Telecommunications&rft.issn=1509-4553&rft.eissn=1899-8852&rft.issue=2&rft_id=info:doi/10.26636%2Fjtit.2012.2.1267&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_e76d7911531a4e698c72d660b1aeb204
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1509-4553&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1509-4553&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1509-4553&client=summon