Skip to main content

ALOPA: Authorization Logic for Property Attestation in Trusted Platforms

  • Conference paper
Book cover Autonomic and Trusted Computing (ATC 2009)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 5586))

Included in the following conference series:

  • 534 Accesses

Abstract

Property based attestation is an extension of the proposed trusted computing attestation mechanism where binary measurements are abstracted to meaningful platform properties. In this paper, we propose ALOPA - Authorization Logic for Property Attestation, a logic based language for the specification and evaluation of authorization policies using properties in trusted platforms. Access control policies specified using ALOPA govern the access of platforms to resources on the basis of the platform’s identity and a collection of rules based on platform properties, which determine, for any platform and any resource, the types of accesses the platform is allowed on the resource. Such an approach seems promising for developing secure distributed applications using property attestation based authorization for trusted platforms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Trusted Computing Group: TPM Main - Part 1 Design Principles, Version 1.2, Revision 103 (July 2007)

    Google Scholar 

  2. Poritz, J., Schunter, M., Herreweghen, E.V., Waidner, M.: Property Attestation—Scalable and Privacy-Friendly Security Assessment of Peer Computers. Technical report, IBM Research (May 2004)

    Google Scholar 

  3. Sadeghi, A.R., Stüble, C.: Property-Based Attestation for Computing Platforms: Caring about Properties, not Mechanisms. In: NSPW 2004: Proceedings of the 2004 Workshop on New Security Paradigms, pp. 67–77. ACM, New York (2004)

    Google Scholar 

  4. Nagarajan, A., Varadharajan, V., Hitchens, M.: Trust Management for Trusted Computing Platforms in Web Services. In: STC 2007: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, pp. 58–62. ACM, New York (2007)

    Chapter  Google Scholar 

  5. Nagarajan, A., Varadharajan, V., Hitchens, M., Arora, S.: On the Applicability of Trusted Computing in Distributed Authorization Using Web Services. In: Atluri, V. (ed.) DAS 2008. LNCS, vol. 5094, pp. 222–237. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  6. Chen, L., Landfermann, R., Löhr, H., Rohe, M., Sadeghi, A.R., Stüble, C.: A Protocol for Property-Based Attestation. In: STC 2006: Proceedings of the first ACM workshop on Scalable Trusted Computing, pp. 7–16. ACM, New York (2006)

    Chapter  Google Scholar 

  7. Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a Role-Based Trust Management Framework. In: Proc. IEEE Symposium on Security and Privacy, Oakland (May 2002)

    Google Scholar 

  8. Jim, T.: SD3: A Trust Management System with Certified Evaluation. In: SP 2001: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Washington, DC, USA, p. 106. IEEE Computer Society, Los Alamitos (2001)

    Chapter  Google Scholar 

  9. DeTreville, J.: Binder - A Logic-Based Security Language. In: SP 2002: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Washington, DC, USA, p. 105. IEEE Computer Society, Los Alamitos (2002)

    Google Scholar 

  10. Jajodia, S., Samarati, P., Subrahmanian, V.S.: A Logical Language for Expressing Authorizations. In: SP 1997: Proceedings of the 1997 IEEE Symposium on Security and Privacy, Washington, DC, USA, p. 31. IEEE Computer Society, Los Alamitos (1997)

    Google Scholar 

  11. Rivest, R.L., Lampson, B.: SDSI - A Simple Distributed Security Infrastructure. Presented at CRYPTO 1996 Rumpsession (1996)

    Google Scholar 

  12. Herzberg, A., Mass, Y., Michaeli, J., Ravid, Y., Naor, D.: Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. In: SP 2000: Proceedings of the IEEE Symposium on Security and Privacy, Washington DC, USA, p. 2. IEEE Computer Society, Los Alamitos (2000)

    Chapter  Google Scholar 

  13. Common Criteria Sponsoring Organizations: Common Criteria for Information Technology Security Evaluation Part 2: Security Functional Components, Version 3.1 Rev 1-Nat’l Inst. of Standards and Technology CCMB-2006-09-002 (September 2006)

    Google Scholar 

  14. Roscoe, A.W., Wulf, L.: Composing and Decomposing Systems under Security Properties. In: CSFW 1995: Proceedings of the 8th IEEE workshop on Computer Security Foundations, Washington, DC, USA, p. 9. IEEE Computer Society, Los Alamitos (1995)

    Google Scholar 

  15. Zakinthinos, A.: On the Composition of Security Properties. PhD thesis, University of Toronto (1996)

    Google Scholar 

  16. Horn, A.: On Sentences which are True of Direct Unions of Algebras. J. Symb. Log. 16(1), 14–21 (1951)

    Article  MathSciNet  MATH  Google Scholar 

  17. Gallier, J.H.: Logic for Computer Science: Foundations of Automatic Theorem Proving. Harper & Row Publishers, Inc., New York (1985)

    MATH  Google Scholar 

  18. Kowalski, R.: Predicate Logic as Programming Language. In: IFIP Congress, pp. 569–574 (1974)

    Google Scholar 

  19. Microsoft Corporation: Network Access Protection Platform Architecture (February 2008)

    Google Scholar 

  20. Cisco Systems: Network Admission Control Documentation Reference Guide. 2.0 edn. (April 2006)

    Google Scholar 

  21. Trusted Computing Group: Trusted Network Connect (TNC) Architecture for Interoperability Version 1.3 (April 2008)

    Google Scholar 

  22. Iverson, E.: NAP Enhanced to Secure Endpoints on and off the Enterprise. Blue Ridge Networks (2008)

    Google Scholar 

  23. Seongyon, H., Eunseok, C., Wonseok, C., Jihyun, L., Youngman, P.: UNETSHA - Plug-in for Extending Microsoft NAP. UNET System Inc., Korea (2008)

    Google Scholar 

  24. Zorn, G.: Microsoft PPP CHAP Extensions, Version 2. RFC 2759 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nagarajan, A., Varadharajan, V., Hitchens, M. (2009). ALOPA: Authorization Logic for Property Attestation in Trusted Platforms. In: González Nieto, J., Reif, W., Wang, G., Indulska, J. (eds) Autonomic and Trusted Computing. ATC 2009. Lecture Notes in Computer Science, vol 5586. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02704-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02704-8_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02703-1

  • Online ISBN: 978-3-642-02704-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics