Skip to main content

Trust Metrics for the SPKI/SDSI Authorisation Framework

  • Conference paper
Automated Technology for Verification and Analysis (ATVA 2011)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 6996))

  • 1136 Accesses

Abstract

SPKI/SDSI is a distributed Public Key Infrastructure (PKI) framework that allows for issuing authorisation certificates granting permissions to access selected parts of privileged data not only to single principals, but also to user-defined groups. The fact that the protocol is decentralised and there is no designated entity that verifies the identity of the users of the system makes the trustfulness vary significantly from one user to another. In order to tackle this problem in decentralised PKI systems many trust metrics were created for computing how much one user can trust another even if they have never interacted with each other before, e.g. the Web of Trust in PGP. We show how to apply two of these metrics in the SPKI/SDSI setting. Specifically, a metric that interprets these values as a probability of non-failure and a metric interpreting them as flows. The fact that SPKI/SDSI is essentially as powerful as pushdown systems makes computation of these trust metrics a lot harder in our setting than when the system can be represented as a finite graph. Actually, both of these problems are shown to be #P-complete, but at the same time we show a randomised approximation algorithm for the trust metric based on the probabilistic interpretation. Finally, to test how fast these values can be computed in practise, we implemented them in a tool called Spookey. Spookey allows for representing an arbitrary system of SPKI/SDSI certificates labelled with trust values. We present the performance results obtained by using our tool.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ball, M.O.: Computational Complexity of Network Reliability Analysis: An Overview. IEEE Transactions on Reliability 35(3), 230–239 (1986)

    Article  MATH  Google Scholar 

  2. Barabási, A.: Emergence of Scaling in Random Networks. Science 286(5439), 509–512 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  3. Beth, T., Borcherding, M., Klein, B.: Valuation of Trust in Open Networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 3–18. Springer, Heidelberg (1994)

    Google Scholar 

  4. Bouajjani, A., Esparza, J., Schwoon, S., Suwimonteerabuth, D.: SDSIrep: A Reputation System Based on SDSI. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 501–516. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. CAcert certification Authority, http://www.cacert.org/

  6. Clarke, D., Elien, J.-E., Ellison, C., Fredette, M., Morcos, A., Rivest, R.L.: Certificate chain discovery in SPKI/SDSI. Journal of Computer Security 9(4), 285–322 (2002)

    Article  Google Scholar 

  7. Dinur, I., Safra, S.: On the Hardness of Approximating Minimum Vertex Cover. Annals of Mathematics 162, 439–485 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  8. Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: RFC 2693: SPKI Certificate theory (1999)

    Google Scholar 

  9. Ford Jr., L.R., Fulkerson, D.R.: Maximial flow through a newtork. Can. J. Math. 8, 399–404 (1956)

    Article  MATH  Google Scholar 

  10. Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys Tutorials 3(4), 2–16 (2000)

    Article  Google Scholar 

  11. Hoeffding, W.: Probability Inequalities for Sums of Bounded Random Variables. Journal of the American Statistical Association 58(301), 13 (1963)

    Article  MathSciNet  MATH  Google Scholar 

  12. Jha, S., Reps, T.: Model checking SPKI / SDSI. Journal of Computer Security 12, 317–353 (2004)

    Article  Google Scholar 

  13. Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)

    Article  Google Scholar 

  14. Josang, A.: An algebra for assessing trust in certification chains. In: Proc. of the Network and Distributed Systems Security Symposium (1999)

    Google Scholar 

  15. Levien, R., Aiken, A.: Attack-Resistant Trust Metrics for Public Key Certification. In: Proceedings of the 7th USENIX Security, pp. 229–242 (1998)

    Google Scholar 

  16. Maurer, U.: Modelling a Public-Key Infrastructure. In: Martella, G., Kurth, H., Montolivo, E., Hwang, J. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 325–350. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  17. Scott Provan, J., Ball, M.O.: The Complexity of Counting Cuts and of Computing the Probability that a Graph is Connected. SIAM Journal on Computing 12(4), 777 (1983)

    Article  MathSciNet  MATH  Google Scholar 

  18. Raz, R., Safra, S.: A Sub-Constant Error-Probability Low-Degree Test, and a Sub-Constant Error-Probability PCP Characterization of NP (1997)

    Google Scholar 

  19. Reiter, M.K., Stubblebine, S.G.: Authentication metric analysis and design. ACM Transactions on Information and System Security 2(2), 138–158 (1999)

    Article  Google Scholar 

  20. Rubinstein, R.Y., Kroese, D.P.: Simulation and the Monte Carlo Method, 2nd edn. Wiley Series in Probability and Statistics, vol. 707. John Wiley & Sons, Chichester (2007)

    Book  MATH  Google Scholar 

  21. Sabater, J., Sierra, C.: Review on Computational Trust and Reputation Models. Artificial Intelligence Review 24(1), 33–60 (2005)

    Article  MATH  Google Scholar 

  22. Valiant, L.G.: The Complexity of Enumeration and Reliability Problems. SIAM Journal on Computing 8(3), 410 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  23. Walukiewicz, I.: Pushdown Processes: Games and Model-Checking. Information and Computation 164(2), 234–263 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  24. Zimmermann, P.R.: The Official PGP User’s Guide. MIT Press, Cambridge (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wojtczak, D. (2011). Trust Metrics for the SPKI/SDSI Authorisation Framework. In: Bultan, T., Hsiung, PA. (eds) Automated Technology for Verification and Analysis. ATVA 2011. Lecture Notes in Computer Science, vol 6996. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24372-1_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24372-1_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24371-4

  • Online ISBN: 978-3-642-24372-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics