Skip to main content
  • 279 Accesses

Synonyms

Certificate-based access control

Definition

In the field of cryptography and security, the term “trust management” has two different yet related usages. The first usage, referred to here as certificate-based trust management, was initiated in the 1996 paper titled “Decentralized Trust Management” [1]. In this usage, trust management is defined to be the study of security policies, security credentials, and trust relationships in network services. More specifically, trust management can be viewed as an approach of using digitally signed certificates to store information for authorization in decentralized distributed systems. In such systems, authorization decisions are based on policy statements made by multiple principals. Policy statements describe the attributes or properties of entities, how to derive one attribute from other attributes, and what attributes are required for authorization. Because such policy statements are issued by different principals and maintained in a...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Blaze M, Feigenbaum J, Lacy J (1996) Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, 6–8 May 1996. IEEE Computer Society Press, Los Alamitos, pp 164–173

    Google Scholar 

  2. Brin S, Page L (1998) The anatomy of a large-scale hypertextual web search engine. In: Proceedings of Seventh International World-Wide Web Conference (WWW 1998), Brisbane, 14–18 April 1998. Elsevier, Amsterdam, pp 107–117

    Google Scholar 

  3. Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. IEEE Comput 29(2): 38–47

    Article  Google Scholar 

  4. Abadi M, Burrows M, Lampson B, Plotkin G (1993) A calculus for access control in distributed systems. ACM Trans Progr Lang Syst 15(4):706–734

    Article  Google Scholar 

  5. Lampson B, Abadi M, Burrows M, Wobber E (1992) Authentication in distributed systems: Theory and practice. ACM Trans Comput Syst 10(4):265–310

    Article  Google Scholar 

  6. Zimmermann PR (1995) The official PGP user’s guide. MIT Press, Cambridge, MA

    Google Scholar 

  7. Rivest RL, Lampson B (1996) SDSI — a simple distributed security infrastructure. Available at http://groups.csail.mit.edu/cis/sdsi.html. Accessed 28 Jan 2011

  8. Ellison C, Frantz B, Lampson B, Rivest R, Thomas B, Ylonen T. SPKI certificate theory. IETF RFC 2693, September 1999

    Google Scholar 

  9. Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD (1999) The KeyNote trust-management system, version 2. IETF RFC 2704, September 1999

    Google Scholar 

  10. Li N, Grosof BN, Feigenbaum J (2003) Delegation logic: a logic-based approach to distributed authorization. ACM Trans Inform Syst Secur 6(1):128–171

    Article  Google Scholar 

  11. Jim T (2001) SD3: a trust management system with certified evaluation. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, 14–16 May 2001. IEEE Computer Society Press, Los Alamitos, pp 106–115

    Google Scholar 

  12. deTreville J (2002) Binder, a logic-based security language. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, 12–15 May 2002. IEEE Computer Society Press, Los Alamitos, pp 105–113

    Google Scholar 

  13. Li N, Winsborough WH, Mitchell JC (2003) Distributed credential chain discovery in trust management. J Comput Secur 11(1):35–86

    Google Scholar 

  14. Li N, Mitchell JC, Winsborough WH (2002) Design of a role-based trust management framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, 12–15 May 2002. IEEE Computer Society Press, Los Alamitos, pp 114–130

    Google Scholar 

  15. Li N, Mitchell JC (2003) Datalog with constraints: a foundation for trust management languages. In: Dahl V, Wadler P (eds) Proceedings of the Fifth International Symposium on Practical Aspects of Declarative Languages (PADL 2003), New Orleans, 13–14 January 2003. Lecture notes in computer science, vol 2562. Springer, Berlin, pp 58–73

    Google Scholar 

  16. Harrison MA, Ruzzo WL, Ullman JD (1976) Protection in operating systems. Commun ACM 19(8):461–471

    Article  MATH  MathSciNet  Google Scholar 

  17. Li N, Mitchell JC, Winsborough WH (2005) Beyond proof-of-compliance: security analysis in trust management. J ACM 52(3):474–514. Preliminary version appeared in Proceedings of 2003 IEEE Symposium on Security and Privacy

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Li, N. (2011). Trust Management. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_840

Download citation

Publish with us

Policies and ethics