Computer Science 725 – Software Security Presentation “Decentralized Trust Management” Decentralized Trust ManagementDecentralized Trust Management M.

Slides:



Advertisements
Similar presentations
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Advertisements

The Role of Trust Management in Distributed Systems Authors Matt Blaze, John Feigenbaum, John Ioannidis, Angelos D. Keromytis Presented By Akshay Gupte.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
PIS: Unit III Digital Signature & Authentication Sanjay Rawat PIS Unit 3 Digital Sign Auth Sanjay Rawat1 Based on the slides of Lawrie.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
OWASP Secure Coding Practices Quick Reference Guide
ETen E-Poll ID – Strasbourg COE meeting November, 2006 Slide 1 E-TEN E-POLL Project Electronic Polling System for Remote Operation Strasbourg.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 12 Slide 1 Distributed Systems Design 2.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
REFEREE: Trust Management for Web Applications Yang-hua Chu (MIT/W3C) Joint Work with Joan Feigenbaum (AT&T Labs) Brian LaMacchia (AT&T Labs) Paul Resnick.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
TGDC Meeting, July 2011 Review of VVSG 1.1 Nelson Hastings, Ph.D. Technical Project Leader for Voting Standards, ITL
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
DIGITAL SIGNATURE AND ELECTRONIC DOCUMENTS IN ITALY Prof. Pierluigi Ridolfi AIPA Authority for Information Technology in the Public Administration V. Solferino,
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
7M701 1 Software Engineering Object-oriented Design Sommerville, Ian (2001) Software Engineering, 6 th edition: Chapter 12 )
A New Computing Paradigm. Overview of Web Services Over 66 percent of respondents to a 2001 InfoWorld magazine poll agreed that "Web services are likely.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Using Digital Credentials On The World-Wide Web M. Winslett.
Cryptographic Technologies
Implementing a Distributed Firewall
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
1 Clark Wilson Implementation Shilpa Venkataramana.
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes Author: Stanislaw Jarecki and Xiaomin Liu University of California, Irvine From:
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Role-based Trust Management Security Policy Analysis and Correction Environment (RT-SPACE). Gregory T. Hoffer CS7323 – Research Seminar (Dr. Qi Tian)
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
What is Enterprise Architecture?
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
The Architecture of Secure Systems Jim Alves-Foss Laboratory for Applied Logic Department of Computer Science University of Idaho By, Nagaashwini Katta.
The CDM Project Cycle. The first step -- submit a PIN (template on Description of Project Proponent Type of Project Location of.
WB Carbon Finance Project Cycle and Role of Key Players Introduction to Carbon Finance March 10, 2004.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Rev. 0 CONFIDENTIAL Mod.19 02/00 Rev.2 Mobile Terminals S.p.A. Trieste Author: M.Fragiacomo, D.Protti, M.Torelli 31 Project Idea Feasibility.
Sanna Liimatainen T Internetworking Seminar1 Scientific Writing T Internetworking Seminar Sanna Liimatainen, Lic. Sc. (Tech)
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
An Analysis of Trust Requirements and Design Choices for Trust Management in Web Services Based Service Oriented Architectures Bienvenida Pagdanganan Supervisor:
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Semantic Web Technologies Research Topics and Projects discussion Brief Readings Discussion Research Presentations.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
KeyNote Presentation KeyNote. Vishwas Patil, TIFR.2/10 KeyNote: “?”  Aim:- A notation for specifying local security policies and security credentials.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
Rfc4474bis-01 IETF 90 (Toronto) STIR WG Jon. First principles (yet again) Separating the work into two buckets: 1) Signaling – What fields are signed,
Decentralized authorization and data security in web content delivery * Danfeng Yao (Brown University, USA) Yunhua Koglin (Purdue University, USA) Elisa.
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized Trust Management. In Proc. of the 17 th Symposium on Security and Privacy, pages IEEE Computer.
PAPI: Simple and Ubiquitous Access to Internet Information Services JISC/CNI Conference - Edinburgh, 27 June 2002.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Database Management Systems
Modeling Complex Systems by Separating Application and Security Concerns H. Gomaa, M. Shin, "Modeling Complex Systems by Separating Application and Security.
Yu, et al.’s “A Model-Driven Development Framework for Enterprise Web Services” In proceedings of the 10 th IEEE Intl Enterprise Distributed Object Computing.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Naming in Content-Oriented Architectures 1. select produce Data publishing RWINameKey Data own certify 2.
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
A Study of Certification Authority Integration Model in a PKI Trust Federation on Distributed Infrastructures for Academic Research Eisaku SAKANE, Takeshi.
TAG Presentation 18th May 2004 Paul Butler
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
Leveraging the Data Map – A Case Study November 15, 2016
OGF PGI – EDGI Security Use Case and Requirements
Cryptography and Network Security
TAG Presentation 18th May 2004 Paul Butler
Presentation transcript:

Computer Science 725 – Software Security Presentation “Decentralized Trust Management” Decentralized Trust ManagementDecentralized Trust Management M. Blaze, J. Feigenbaum, J. Lacy, IEEE Symposium on Security and Privacy, pp ,

Summary Identify Trust Management as a distinct and important component in network security Identify Trust Management as a distinct and important component in network security Review of 2 existing systems Review of 2 existing systems Present a new comprehensive approach to this problem Present a new comprehensive approach to this problem Describe a prototype (PolicyMaker) which implements this new approach Describe a prototype (PolicyMaker) which implements this new approach

What is Trust Management? Policy (a banking system requires at least k officers to approve a loan of $10,000) Policy (a banking system requires at least k officers to approve a loan of $10,000) Credentials (enable an employee to prove he can be counted as 1 out of k approvers) Credentials (enable an employee to prove he can be counted as 1 out of k approvers) Trust (enable the bank to specify who may issue such credentials) Trust (enable the bank to specify who may issue such credentials) Public Key

Principles of our approach Unified mechanism Unified mechanism A common language is provided for policies, credentials, and relationshipsA common language is provided for policies, credentials, and relationships Flexibility Flexibility The system is rich enough to support potentially complex relationships in large networksThe system is rich enough to support potentially complex relationships in large networks Locality of control Locality of control Each party in the network can independently decide whether to accept the credentials presentedEach party in the network can independently decide whether to accept the credentials presented Separation of mechanism from policy Separation of mechanism from policy The mechanisms for verification does not depend on the credentials themselvesThe mechanisms for verification does not depend on the credentials themselves

Review of Existing Systems What are some potential issues with this system? PGP framework uses “ key certificates” in which trusted third parties (C, D) signs copies of a public key to be distributed PGP framework uses “ key certificates” in which trusted third parties (C, D) signs copies of a public key to be distributed X.509 framework uses a similar system, but also postulates that public keys are only obtained from official “certifying authorities” (C, D) X.509 framework uses a similar system, but also postulates that public keys are only obtained from official “certifying authorities” (C, D) Specify trust Public Key signed by C Public Key signed by D Etc … B accepts Public Key if its trust value is high enough

PolicyMaker Approach 1 Obtain certificates, verify signatures on certificates and on application request, determine public key of original signer(s) 2 Verify that certificates are unrevoked 3 Find “trust path” from trusted certifier to certificate of public key in question 4 Extract names from certificates 5 Lookup names in database that maps names to the actions that they are trusted to perform 6 Determine whether requested action is legal, based on the names extracted from certificates and whether the certification authorities are permitted to authorize such actions according to local policy. 7 Proceed if everything appears valid PolicyMakerSubmit request, certificates, and description of local policy to local “trust management engine”

The PolicyMaker System What are some potential issues with this system? An independent trust management engine to be used either as a linked library (within systems) or daemon (background application) An independent trust management engine to be used either as a linked library (within systems) or daemon (background application) Called using action query strings Called using action query strings Extendable to allow for external verification of signatures Extendable to allow for external verification of signatures

Comments The idea behind this paper is good The idea behind this paper is good Encapsulation of trust managementEncapsulation of trust management Better security provided by consolidated systemBetter security provided by consolidated system The idea presented is more difficult to implement The idea presented is more difficult to implement Dedicated trust management engine and parser is more difficult to implement than certificate based systemDedicated trust management engine and parser is more difficult to implement than certificate based system Only applicable to large commercial applicationsOnly applicable to large commercial applications Protype is already made. Protype is already made.Questions?