Abstract
In this paper we first introduce a logic for describing formally a family of delegation and revocation models that are based on the work in Hagström et al.. We then extend our logic to accommodate an epistemic interpretation of trust within the framework that we define. What emerges from this work is a rich framework of formally well-defined delegation and revocation schemes that accommodates an important trust component.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
FPDAM on Certificate Extensions. Final Proposed Draft Amendment on Certificate Extensions (V6), Collaborative ITU and ISO/IEC USA (April 1999)
Abadi, M.: Logic in access control. In: 18th IEEE Symposium on Logic in Computer Science (LICS), p. 228 (2003)
Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Trans. Program. Lang. Syst. 15(4), 706–734 (1993)
Aucher, G., Barker, S., Boella, G., Genovese, V., van der Torre, L.: Dynamics in delegation and revocation schemes: a logical approach, technical report (2011), http://www.di.unito.it/~genovese/publications.html
Boella, G., van der Torre, L.W.N.: Delegation of power in normative multiagent systems. In: Goble, L., Meyer, J.-J.C. (eds.) DEON 2006. LNCS (LNAI), vol. 4048, pp. 36–52. Springer, Heidelberg (2006)
Clarke, D.E., Elien, J.-E., Ellison, C.M., Fredette, M., Morcos, A., Rivest, R.L.: Certificate chain discovery in SPKI/SDSI. J. Comp. Sec. 9(4), 285–322 (2001)
Demolombe, R.: Reasoning about trust: A formal logical framework. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 291–303. Springer, Heidelberg (2004)
Firozabadi, B.S., Sergot, M.J., Bandmann, O.L.: Using authority certificates to create management structures. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2001. LNCS, vol. 2467, pp. 134–145. Springer, Heidelberg (2002)
Hagström, Å., Jajodia, S., Parisi-Presicce, F., Wijesekera, D.: Revocations-a classification. In: Procs. of CSFW-14, pp. 44–58 (2001)
Herzig, A., Troquard, N.: The dynamic logic of propositional control. In: Procs. of LIS@ESSLLI2010, pp. 107–121 (2010)
Kuntze, N., Schmidt, A.U.: Transitive trust in mobile scenarios. In: Müller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 73–85. Springer, Heidelberg (2006)
Li, N., Mitchell, J., Winsborough, W.: Design of a role-based trust-management framework. In: IEEE Symp. on Sec. and Privacy, pp. 114–130 (2002)
Norman, T.J., Reed, C.: A logic of delegation. Artif. Intell. 174(1), 51–71 (2010)
van der Hoek, W., Walther, D., Wooldridge, M.: Reasoning about the transfer of control. J. Artif. Intell. Res. (JAIR) 37, 437–477 (2010)
Weidenbach, C., Dimova, D., Fietzke, A., Kumar, R., Suda, M., Wischnewski, P.: SPASS version 3.5. In: Schmidt, R.A. (ed.) CADE-22. LNCS, vol. 5663, pp. 140–145. Springer, Heidelberg (2009)
Wen, W., Mizoguchi, F.: An authorization-based trust model for multiagent systems. Applied Artif. Intell. 14(9), 909–925 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 IFIP International Federation for Information Processing
About this paper
Cite this paper
Aucher, G., Barker, S., Boella, G., Genovese, V., van der Torre, L. (2011). Dynamics in Delegation and Revocation Schemes: A Logical Approach. In: Li, Y. (eds) Data and Applications Security and Privacy XXV. DBSec 2011. Lecture Notes in Computer Science, vol 6818. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22348-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-22348-8_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22347-1
Online ISBN: 978-3-642-22348-8
eBook Packages: Computer ScienceComputer Science (R0)