Synonyms
Definition
In the field of cryptography and security, the term “trust management” has two different yet related usages. The first usage, referred to here as certificate-based trust management, was initiated in the 1996 paper titled “Decentralized Trust Management” [1]. In this usage, trust management is defined to be the study of security policies, security credentials, and trust relationships in network services. More specifically, trust management can be viewed as an approach of using digitally signed certificates to store information for authorization in decentralized distributed systems. In such systems, authorization decisions are based on policy statements made by multiple principals. Policy statements describe the attributes or properties of entities, how to derive one attribute from other attributes, and what attributes are required for authorization. Because such policy statements are issued by different principals and maintained in a...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Blaze M, Feigenbaum J, Lacy J (1996) Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, 6–8 May 1996. IEEE Computer Society Press, Los Alamitos, pp 164–173
Brin S, Page L (1998) The anatomy of a large-scale hypertextual web search engine. In: Proceedings of Seventh International World-Wide Web Conference (WWW 1998), Brisbane, 14–18 April 1998. Elsevier, Amsterdam, pp 107–117
Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. IEEE Comput 29(2): 38–47
Abadi M, Burrows M, Lampson B, Plotkin G (1993) A calculus for access control in distributed systems. ACM Trans Progr Lang Syst 15(4):706–734
Lampson B, Abadi M, Burrows M, Wobber E (1992) Authentication in distributed systems: Theory and practice. ACM Trans Comput Syst 10(4):265–310
Zimmermann PR (1995) The official PGP user’s guide. MIT Press, Cambridge, MA
Rivest RL, Lampson B (1996) SDSI — a simple distributed security infrastructure. Available at http://groups.csail.mit.edu/cis/sdsi.html. Accessed 28 Jan 2011
Ellison C, Frantz B, Lampson B, Rivest R, Thomas B, Ylonen T. SPKI certificate theory. IETF RFC 2693, September 1999
Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD (1999) The KeyNote trust-management system, version 2. IETF RFC 2704, September 1999
Li N, Grosof BN, Feigenbaum J (2003) Delegation logic: a logic-based approach to distributed authorization. ACM Trans Inform Syst Secur 6(1):128–171
Jim T (2001) SD3: a trust management system with certified evaluation. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, 14–16 May 2001. IEEE Computer Society Press, Los Alamitos, pp 106–115
deTreville J (2002) Binder, a logic-based security language. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, 12–15 May 2002. IEEE Computer Society Press, Los Alamitos, pp 105–113
Li N, Winsborough WH, Mitchell JC (2003) Distributed credential chain discovery in trust management. J Comput Secur 11(1):35–86
Li N, Mitchell JC, Winsborough WH (2002) Design of a role-based trust management framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, 12–15 May 2002. IEEE Computer Society Press, Los Alamitos, pp 114–130
Li N, Mitchell JC (2003) Datalog with constraints: a foundation for trust management languages. In: Dahl V, Wadler P (eds) Proceedings of the Fifth International Symposium on Practical Aspects of Declarative Languages (PADL 2003), New Orleans, 13–14 January 2003. Lecture notes in computer science, vol 2562. Springer, Berlin, pp 58–73
Harrison MA, Ruzzo WL, Ullman JD (1976) Protection in operating systems. Commun ACM 19(8):461–471
Li N, Mitchell JC, Winsborough WH (2005) Beyond proof-of-compliance: security analysis in trust management. J ACM 52(3):474–514. Preliminary version appeared in Proceedings of 2003 IEEE Symposium on Security and Privacy
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Li, N. (2011). Trust Management. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_840
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_840
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering