Skip to main content

A Logic for Analysing Subterfuge in Delegation Chains

  • Conference paper
Formal Aspects in Security and Trust (FAST 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3866))

Included in the following conference series:

Abstract

Trust Management is an approach to construct and interpret the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic credentials are used to specify delegation of authorisation among public keys. Existing trust management schemes are operational in nature, defining security in terms of specific controls such as delegation chains, threshold schemes, and so forth. However, they tend not to consider whether a particular authorisation policy is well designed in the sense that a principle cannot somehow bypass the intent of a complex series of authorisation delegations via some unexpected circuitous route.

In this paper we consider the problem of authorisation subterfuge, whereby, in a poorly designed system, delegation chains that are used by principals to prove authorisation may not actually reflect the original intention of all of the participants in the chain. A logic is proposed that provides a systematic way of determining whether a particular delegation scheme using particular authorisation is sufficiently robust to be able to withstand attempts at subterfuge. This logic provides a new characterisation of certificate reduction that, we argue, is more appropriate to open systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The keynote trustmanagement system, version 2, IETF RFC 2704 (September 1999)

    Google Scholar 

  2. Blaze, M., Ioannidis, J., Ioannidis, S., Keromytis, A., Nikander, P., Prevelakis, V.: Tapi: Transactions for accessing public infrastructure. In: Conti, M., Giordano, S., Gregori, E., Olariu, S. (eds.) PWC 2003. LNCS, vol. 2775, pp. 90–100. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Blaze, M., Ioannidis, J., Keromytis, A.D.: Offline micro-payments without trusted hardware. In: Financial Cryptography, Grand Cayman (February 2001)

    Google Scholar 

  4. Clark, J.A., Jacob, J.L.: A survey of authentication protocol literature, version 1.0. (1997), http://www.cs.york.ac.uk/jac/

  5. Clarke, D., Elien, J.-E., Ellison, C., Fredette, M., Morcos, A., Rivest, R.L.: Certificate chain discovery in spki/sdsi. Journal of Computer Security 9(4), 285–322 (2001)

    Article  Google Scholar 

  6. DeTreville, J.: Binder, a logic-based security language. In: Proceedings of the 2002 IEEE Symposium on Research in Security and Privacy, pp. 105–113. IEEE Computer Society Press, Los Alamitos (2002)

    Chapter  Google Scholar 

  7. Ellison, C.: The nature of a usable PKI. Computer Networks 31, 823–830 (1999)

    Article  Google Scholar 

  8. Ellison, C., Dohrmann, S.: Public-key support for group collaboration. ACM Transactions on Information and System Security (TISSEC) 6(4), 547–565 (2003)

    Article  Google Scholar 

  9. Ellison, C., Frantz, B., Lampson, B., Rivest, R.L., Thomas, B., Ylonen, T.: Spki certificate theory, IETF RFC 2693 (September 1999)

    Google Scholar 

  10. Ellison, C.M., Frantz, B., Lampson, B., Rivest, R., Thomas, B.M., Ylonen, T.: Spki examples (September 1998)

    Google Scholar 

  11. Foley, S.: A non-functional approach to system integrity. IEEE Journal on Selected Areas in Communications 21(1) (2003)

    Google Scholar 

  12. Foley, S.: Using trust management to support transferable hash-based micropayments. In: Proceedings of the 7th International Financial Cryptography Conference, Gosier, Guadeloupe, FWI (January 2003)

    Google Scholar 

  13. Foley, S.: Believing in the integrity of a system. In: IJCAR Workshop on Automated Reasoning for Security Protocol Analysis. Electronic Notes in Computer Science. Springer, Heidelberg (2004)

    Google Scholar 

  14. Foley, S.N., Zhou, H.: Authorisation subterfuge by delegation in decentralized networks. In: International Security Protocols Workshop, Cambridge, UK (April 2005)

    Google Scholar 

  15. Housley, R., Polk, W., Ford, W., Solo, D.: Internet x.509 public key infrastructure certificate and certificate revocation list (crl) profile (April 2002)

    Google Scholar 

  16. Li, N., et al.: Beyond proof-of-compliance: Safety and availability analysis in trust management. In: Proceedings of 2003 IEEE Symposium on Security and Privacy. IEEE, Los Alamitos (2003)

    Google Scholar 

  17. Lowe, G.: A hierarchy of authentication specifications. In: PCSFW: Proceedings of The 10th Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhou, H., Foley, S.N. (2006). A Logic for Analysing Subterfuge in Delegation Chains. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds) Formal Aspects in Security and Trust. FAST 2005. Lecture Notes in Computer Science, vol 3866. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11679219_10

Download citation

  • DOI: https://doi.org/10.1007/11679219_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-32628-1

  • Online ISBN: 978-3-540-32629-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics