Abstract
We propose CoreTuLiP - the core of a trust management language based on Logic Programming. CoreTuLiP is based on a subset of moded logic programming, but enjoys the features of TM languages such as RT; in particular clauses are issued by different authorities and stored in a distributed manner. We present a lookup and inference algorithm which we prove to be correct and complete w.r.t. the declarative semantics. CoreTuLiP enjoys uniform syntax and the well-established semantics and is expressive enough to model scenarios which are hard to deal with in RT.
This work was supported by the projects: Freeband I-Share, EU-NoE-ARTIST2, and EU-IST-IP-SERENITY (contract N 27587). Permanent address of both authors: University of Twente.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Apt, K.R.: From Logic Programming to Prolog. Prentice-Hall, Englewood Cliffs (1997)
Apt, K.R., Luitjes, I.: Verification of Logic Programs with Delay Declarations. In: Alagar, V.S., Nivat, M. (eds.) AMAST 1995. LNCS, vol. 936, pp. 66–90. Springer, Heidelberg (1995)
Apt, K.R., Marchiori, E.: Reasoning about Prolog programs: from Modes through Types to Assertions. Formal Aspects of Computing 6(6A), 743–765 (1994)
Bertino, E., Ferrari, E., Squicciarini, A.C.: Trust-χ: A Peer-to-Peer Framework for Trust Establishment. IEEE Trans. Knowl. Data Eng. 16(7), 827–842 (2004)
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The KeyNote Trust-Management System, Version 2. IETF RFC 2704 (September 1999)
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The Role of Trust Management in Distributed Systems Security. In: Vitek, J., Jensen, C. (eds.) Secure Internet Programming. LNCS, vol. 1603, pp. 185–210. Springer, Heidelberg (1999)
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proc. of the 17th IEEE Symposium on Security and Privacy, pp. 164–173. IEEE Computer Society Press, Los Alamitos (1996)
Clarke, D., Elien, J.E., Ellison, C., Fredette, M., Morcos, A., Rivest, R.L.: Certificate Chain Discovery in SPKI/SDSI. Journal of Computer Security 9(4), 285–322 (2001)
Czenko, M.R., Etalle, S.: Core TuLiP. Technical Report TR-CTIT-07-22, Centre for Telematics and Information Technology. University of Twente, Enschede (March 2007)
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory. IETF RFC 2693 (September 1999)
Etalle, S., Winsborough, W.H.: Integrity Constraints in Trust Management – Extended Abstract. In: Ahn, G-J. (ed.) Proc. 10th ACM Symp. on Access Control Models and Technologies (SACMAT), pp. 1–10. ACM Press, New York (2005), Extended version available at CoRR: http://arxiv.org/abs/cs.CR/0503061
Freeband Communication. I-Share: Sharing Resources in Virtual Communities for Storage, Communications, and Processing of Multimedia Data. URL: http://www.freeband.nl/project.cfm?language=en&id=520
Jim, T.: SD3: A Trust Management System with Certified Evaluation. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, pp. 106–115. IEEE Computer Society Press, Los Alamitos (2001)
Li, N., Grosof, B., Feigenbaum, J.: Delegation Logic: A Logic-based Approach to Distributed Authorization. ACM Transactions on Information and System Security (TISSEC) 6(1), 128–171 (2003)
Li, N., Mitchell, J., Winsborough, W.: Design of A Role-based Trust-management Framework. In: Proc. 2002 IEEE Symposium on Security and Privacy, pp. 114–130. IEEE Computer Society Press, Los Alamitos (2002)
Li, N., Winsborough, W., Mitchell, J.: Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security 11(1), 35–86 (2003)
Lloyd, J.W.: Foundations of Logic Programming, 2nd edn. Springer, Heidelberg (1993)
Czenko, M., Tran, H., Doumen, J., Etalle, S., Hartel, P., den Hartog, J.: Nonmonotonic Trust Management for P2P Applications. In: Proc. of the 1st International Workshop on Security and Trust Management. Electronic Notes in Theoretical Computer Science, vol. 157, pp. 113–130. Elsevier, Amsterdam (2006)
OASIS.: eXtensible Access Control Markup Language (XACML) Version 2.0 (February 2005), URL: http://www.oasis.org
Rivest, R., Lampson, B.: SDSI - A Simple Distributed Security Infrastructure (October 1996), Available at http://theory.lcs.mit.edu/~rivest/sdsi11.html
Winsborough, W.H., Li, N.: Towards Practical Automated Trust Negotiation. In: POLICY, pp. 92–103. IEEE Computer Society Press, Los Alamitos (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Czenko, M., Etalle, S. (2007). Core TuLiP Logic Programming for Trust Management. In: Dahl, V., Niemelä, I. (eds) Logic Programming. ICLP 2007. Lecture Notes in Computer Science, vol 4670. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74610-2_26
Download citation
DOI: https://doi.org/10.1007/978-3-540-74610-2_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74608-9
Online ISBN: 978-3-540-74610-2
eBook Packages: Computer ScienceComputer Science (R0)