Chained and Delegable Authorization Tokens
- G. Navarro
- J. García
- J. A. Ortega-Ruiz
- Dept. of Computer Science
Universitat Autònoma de Barcelona
NordSec 2004
- G. Navarro et al. (UAB)
CADAT NordSec 2004 1 / 15
Chained and Delegable Authorization Tokens G. Navarro J. Garca J. - - PowerPoint PPT Presentation
Chained and Delegable Authorization Tokens G. Navarro J. Garca J. A. Ortega-Ruiz Dept. of Computer Science Universitat Autnoma de Barcelona NordSec 2004 G. Navarro et al. (UAB) CADAT NordSec 2004 1 / 15 Outline Introduction 1
CADAT NordSec 2004 1 / 15
CADAT NordSec 2004 2 / 15
CADAT NordSec 2004 3 / 15
Introduction
CADAT NordSec 2004 4 / 15
Introduction
CADAT NordSec 2004 4 / 15
Introduction
CADAT NordSec 2004 4 / 15
Introduction
CADAT NordSec 2004 4 / 15
Introduction
CADAT NordSec 2004 4 / 15
Example Initialization
{ contract(acme,10) }
Generate hash chain: h_10, h_9, ..., h_1
CADAT NordSec 2004 5 / 15
Example Initialization
{ contract(acme,10) }
Generate hash chain: h_10, h_9, ..., h_1
CADAT NordSec 2004 5 / 15
Example Initialization
{ contract(acme,10) }
Generate hash chain: h_10, h_9, ..., h_1 { contract(h_10) }
CADAT NordSec 2004 5 / 15
Example Initialization
{ contract(acme,10) } h_9
Generate hash chain: h_10, h_9, ..., h_1 { contract(h_10) }
CADAT NordSec 2004 5 / 15
Example Initialization
{ contract(acme,10) } h_9 h_8
Generate hash chain: h_10, h_9, ..., h_1 { contract(h_10) }
CADAT NordSec 2004 5 / 15
Example Token delgation
CADAT NordSec 2004 6 / 15
Example Token delgation
{ token-deleg(h_8) }
CADAT NordSec 2004 6 / 15
Example Token delgation
h_7
{ token-deleg(h_8) }
CADAT NordSec 2004 6 / 15
Example Token delgation
h_7 h_6
{ token-deleg(h_8) }
CADAT NordSec 2004 6 / 15
Example Chain delegation
CADAT NordSec 2004 7 / 15
Example Chain delegation
{ chain-deleg(h_6) }
CADAT NordSec 2004 7 / 15
Example Chain delegation
{ chain-deleg(h_6) } h_5
CADAT NordSec 2004 7 / 15
Example Chain delegation
{ chain-deleg(h_6) } h_5
h_4
CADAT NordSec 2004 7 / 15
Delegation in CADAT
CADAT NordSec 2004 8 / 15
Delegation in CADAT
CADAT NordSec 2004 8 / 15
Implementation and Applications Implementation
CADAT NordSec 2004 9 / 15
Implementation and Applications Implementation
CADAT NordSec 2004 9 / 15
Implementation and Applications Implementation
CADAT NordSec 2004 9 / 15
Implementation and Applications SPKI cert without using full tag intersection
CADAT NordSec 2004 10 / 15
Implementation and Applications SPKI cert without using full tag intersection
CADAT NordSec 2004 10 / 15
Implementation and Applications SPKI cert using full tag intersection
CADAT NordSec 2004 11 / 15
Implementation and Applications SPKI cert using full tag intersection
CADAT NordSec 2004 11 / 15
Implementation and Applications SPKI cert using full tag intersection
CADAT NordSec 2004 12 / 15
Implementation and Applications SPKI cert using full tag intersection
CADAT NordSec 2004 12 / 15
Implementation and Applications SPKI cert using full tag intersection
CADAT NordSec 2004 12 / 15
Implementation and Applications SPKI cert using full tag intersection
Alice’s mobile agent
token-contract-cert
initial chain-contrac-cert publish access tokens for her agents verify contract, and accept tokens for M, if all verifications are successful
CADAT NordSec 2004 13 / 15
Conclusions
CADAT NordSec 2004 14 / 15
Conclusions
CADAT NordSec 2004 14 / 15
Conclusions
CADAT NordSec 2004 14 / 15
Conclusions
CADAT NordSec 2004 15 / 15