Download presentation
Presentation is loading. Please wait.
Published byJeremy Tucker Modified over 9 years ago
1
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Automatic Trust Negotiation Rajesh Gangam http://people.cs.vt.edu/~gangamra/index.html Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech
2
Quick Facts of Logic /Deductive Language. Predicates: p and q True, False Is p OR q ⇔ NOT( (NOT p) AND (NOT q)) ? Yes! With “logical NOT” and “logical AND” You can make any logic statement. Positive Rules or Horn clause. No NOT Statement Only “Logical AND” Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech
3
Demo of PROTUNE http://policy.l3s.uni- hannover.de:9080/policyFramework/protune/de mo.html
4
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech No Registration Needed: How to use Declarative Policies an Negotiation to access Sensitive Resources on the Semantic Web. Rita Gavriloaie, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons Marianne Winslett
5
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Overview Problem Solution Trust Negotiation Guarded Distributed Logic Programs “PeerTrust” execution environment. Application Scenario.
6
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Problems In Web Resource Access Registration, Login/Password No Automation Trust based on Shared Information of Service One Way of Trust. Two Way Trust / Conditional Disclosure. Multiple Levels of Trust. Validity of Information, No Standards.
7
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Proposal/Solution: Policy based access control. Automated Trust negotiation.
8
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Trust Negotiation Digital Credentials. Credential Issuer X.509 certificates Anonymous credentials/ Zero Knowledge Simplest Form. Signed XML statements.
9
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Trust Negotiation Vs Traditional Trust Mutual Trust with Digital credentials. Resources protected by ACL Includes Services, Roles, Credentials. Policies, Capabilities. Equivalent Peer to Peer Trust.
10
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Goal Resource “R” and Credentials “C”. R C 1 AND C 2 …. AND C k
11
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech PeerTrust Guarded Distributed Logic Program PeerTrust Logic Program Distributed Logic Program Guarded Logic Program
12
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech PeerTrust Logic Program Its Horn’s Clause. No Negative Rules.
13
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Distributed Logic Program References to Other Peers. Issuer argument Delegation of the Rule Evaluation to the Peer/Third Party. ( Like RPC – Remote Procedure Call) Nested References ( Like Nested RPC). Attached to Evaluation part of String. Requester argument Nested References. Attached to Result Part of String.
14
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Distributed Logic Program Local Rules ACL rules Party specific rules Cached rules (Needs Signed Rules) Signed Rules Rules can be signed. Reference Rules Should/Must be signed.
15
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Guarded Logic Guards Precedence Order of Rules In Parallel Logic Programming Systems. Public and Private Predicates Object Oriented Rules.
16
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech
17
Execution Environment Dynamic Policy for each resource. Act on Meta-Data Security Infrastructure.
18
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Conclusion The problem of explicit registration is solved. Guarded Distributed Logic Programs is Developed.
19
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech A Flexible Policy-Driven Trust Negotiation Model. De Coi, J. L. and Olmedilla, D.
20
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Overview Problem Negotiation Requirements Negotiation Model Conclusion
21
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Problem Numerous Trust Negotiation Software Dissimilar Features Dissimilar scenarios Need for a Generic Model.
22
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Negotiation Requirements Negotiation Actors + External Actions + Notifications +Local Actions + Action Selection Function + Policy Policy Filtering - Termination Algorithm - Explanation -
23
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Negotiation Model Policy Set of Rules No Negation applied to any predicate Negotiation Message Policy Notifications Negotiation History To provide an explanation.
24
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Negotiation Model Negotiation State Machine To identify the next steps. Bilateral Negotiation No Empty Negotiations. Empty = No New Info. Monotonic : Any Other Rules added will not change from False to True..
25
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Conclusion Summarized the Main features any Trust Negotiation Software Should follow.
26
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Discussion Semi Automatic Negotiations? Users Will Have Better Control But It will be visible to user and How easy would be the Usability? No Usability Tests done? What could be the possible Usability tests?
27
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech THANK YOU
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.