Abstract
Certifying software-based systems is a time-consuming and expensive task that requires much manual human effort. We introduce Online Certification, a partly automated version of the certification process, where participants provide the necessary information dynamically. All information is cryptographically signed to ensure integrity and authorization, and a system of certificates allows for fine-grained delegation of competencies. The requirements for certification, as well as the information needed to fulfill them, are represented in a subset of first-order logic. Consequently, validation is performed using automated logic reasoning. Compared to existing approaches, Online Certification enhances flexibility and agility. In cases where automatic generation of certification data is not possible, human certification processes can be integrated.
This work has received support by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation)—project number 389792660—TRR 248—CPEC, see https://perspicuous-computing.science.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alrabbaa, C., Baader, F., Borgwardt, S., Dachselt, R., Koopmann, P., Méndez, J.: Evonne: interactive proof visualization for description logics (system description). In: Blanchette, J., Kovács, L., Pattinson, D. (eds.) Automated Reasoning—11th International Joint Conference, IJCAR 2022, Haifa, Israel, August 8-10, 2022, Proceedings, volume 13385 of Lecture Notes in Computer Science, pp. 271–280. Springer (2022). https://doi.org/10.1007/978-3-031-10769-6_16
The SPIFFE authors. Spiffe overview, 2024. URL https://spiffe.io/docs/latest/spiffe-about/overview/
in-toto authors. What is in-toto?, 2023. URL https://in-toto.io/in-toto/
Blanchet, B: An efficient cryptographic protocol verifier based on prolog rules. In: 14th IEEE Computer Security Foundations Workshop (CSFW-14), pp. 82–96
Cassar, I., Francalanza, A., Aceto, L., Ingólfsdóttir, A.: A survey of runtime monitoring instrumentation techniques. Electron Proc Theoret. Comput. Sci. 254, 15–28 (2017). ISSN 2075-2180. https://doi.org/10.4204/eptcs.254.2
Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)
European Parliament. Directive (eu) 2022/2555 of the european parliament and of the council of 14 december 2022 on measures for a high common level of cybersecurity across the union, amending regulation (eu) no 910/2014 and directive (eu) 2018/1972, and repealing directive (eu) 2016/1148 (nis 2 directive), 2022. https://eur-lex.europa.eu/eli/dir/2022/2555/oj?uri=CELEX:32022L2555
Holzmann, G.J.: The model checker spin. IEEE Trans. Software Eng. 23(5), 279–295 (1997)
ISO 27001:2022. Information security, cybersecurity and privacy protection - Information security management systems - Requirements. Standard, International Organization for Standardization, Geneva, CH, January 2022
ISO 27002:2022. Information security, cybersecurity and privacy protection - Information security controls. Standard, International Organization for Standardization, Geneva, CH, January 2022
ISO 27799:2016. Health informatics - Information security management in health using ISO/IEC 27002. Standard, International Organization for Standardization, Geneva, CH, December 2016
Sthefano, M., da SILVA, L., et al.: Integrating spiffe and scone to enable universal identity support for confidential workloads (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Wenzel, J., Berg, A., Fetzer, C. (2025). Invited Paper: Using Signed Formulas for Online Certification. In: Masuzawa, T., Katayama, Y., Kakugawa, H., Nakamura, J., Kim, Y. (eds) Stabilization, Safety, and Security of Distributed Systems. SSS 2024. Lecture Notes in Computer Science, vol 14931. Springer, Cham. https://doi.org/10.1007/978-3-031-74498-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-031-74498-3_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-74497-6
Online ISBN: 978-3-031-74498-3
eBook Packages: Computer ScienceComputer Science (R0)