Distributed proving in access-control systems

Abstract

We present a distributed algorithm for assembling a proof that a request satisfies an access-control policy expressed in a formal logic, in the tradition of Lampson et al. (1992). We show analytically that our distributed proof-generation algorithm succeeds in assembling a proof whenever a centralized prover utilizing remote certificate retrieval would do so. In addition, we show empirically that our algorithm outperforms centralized approaches in various measures of performance and usability notably the number of remote requests and the number of user interruptions. We show that when combined with additional optimizations including caching and automatic tactic generation, which we introduce here, our algorithm retains its advantage, while achieving practical performance. Finally, we briefly describe the utilization of these algorithms as the basis for an access-control framework being deployed for use at our institution.

DOI: 10.1109/SP.2005.9
View Slides

Extracted Key Phrases

8 Figures and Tables

Statistics

0102030'04'05'06'07'08'09'10'11'12'13'14'15'16'17
Citations per Year

138 Citations

Semantic Scholar estimates that this publication has 138 citations based on the available data.

See our FAQ for additional information.

Cite this paper

@article{Bauer2005DistributedPI, title={Distributed proving in access-control systems}, author={Lujo Bauer and Scott Garriss and Michael K. Reiter}, journal={2005 IEEE Symposium on Security and Privacy (S&P'05)}, year={2005}, pages={81-95} }