chained and delegable authorization tokens
play

Chained and Delegable Authorization Tokens G. Navarro J. Garca J. - PowerPoint PPT Presentation

Chained and Delegable Authorization Tokens G. Navarro J. Garca J. A. Ortega-Ruiz Dept. of Computer Science Universitat Autnoma de Barcelona NordSec 2004 G. Navarro et al. (UAB) CADAT NordSec 2004 1 / 15 Outline Introduction 1


  1. Chained and Delegable Authorization Tokens G. Navarro J. García J. A. Ortega-Ruiz Dept. of Computer Science Universitat Autònoma de Barcelona NordSec 2004 G. Navarro et al. (UAB) CADAT NordSec 2004 1 / 15

  2. Outline Introduction 1 Example 2 Initialization Token delgation Chain delegation 3 Delegation in CADAT Implementation and Applications 4 Implementation SPKI cert without using full tag intersection SPKI cert using full tag intersection 5 Conclusions G. Navarro et al. (UAB) CADAT NordSec 2004 2 / 15

  3. Outline Introduction 1 Example 2 Initialization Token delgation Chain delegation 3 Delegation in CADAT Implementation and Applications 4 Implementation SPKI cert without using full tag intersection SPKI cert using full tag intersection 5 Conclusions G. Navarro et al. (UAB) CADAT NordSec 2004 3 / 15

  4. Introduction Chained And Delegable Authorization Tokens Hash chains as chains of authorization tokens. tokens represent generic authorizations (not just micropayments). Delegation delegation of chains or subchains. Implemented with a trust management infrastructure. CADAT C hained A nd D elegable A uthorization T okens G. Navarro et al. (UAB) CADAT NordSec 2004 4 / 15

  5. Introduction Chained And Delegable Authorization Tokens Hash chains as chains of authorization tokens. tokens represent generic authorizations (not just micropayments). Delegation delegation of chains or subchains. Implemented with a trust management infrastructure. CADAT C hained A nd D elegable A uthorization T okens G. Navarro et al. (UAB) CADAT NordSec 2004 4 / 15

  6. Introduction Chained And Delegable Authorization Tokens Hash chains as chains of authorization tokens. tokens represent generic authorizations (not just micropayments). Delegation delegation of chains or subchains. Implemented with a trust management infrastructure. CADAT C hained A nd D elegable A uthorization T okens G. Navarro et al. (UAB) CADAT NordSec 2004 4 / 15

  7. Introduction Chained And Delegable Authorization Tokens Hash chains as chains of authorization tokens. tokens represent generic authorizations (not just micropayments). Delegation delegation of chains or subchains. Implemented with a trust management infrastructure. CADAT C hained A nd D elegable A uthorization T okens G. Navarro et al. (UAB) CADAT NordSec 2004 4 / 15

  8. Introduction Chained And Delegable Authorization Tokens Hash chains as chains of authorization tokens. tokens represent generic authorizations (not just micropayments). Delegation delegation of chains or subchains. Implemented with a trust management infrastructure. CADAT C hained A nd D elegable A uthorization T okens G. Navarro et al. (UAB) CADAT NordSec 2004 4 / 15

  9. Example Initialization Example: first use AcmeNews Alice { contract(acme,10) } Generate hash chain: h_10, h_9, ..., h_1 G. Navarro et al. (UAB) CADAT NordSec 2004 5 / 15

  10. Example Initialization Example: first use AcmeNews Alice { contract(acme,10) } Generate hash chain: h_10, h_9, ..., h_1 G. Navarro et al. (UAB) CADAT NordSec 2004 5 / 15

  11. Example Initialization Example: first use AcmeNews Alice { contract(acme,10) } Generate hash chain: { contract(h_10) } h_10, h_9, ..., h_1 G. Navarro et al. (UAB) CADAT NordSec 2004 5 / 15

  12. Example Initialization Example: first use AcmeNews Alice { contract(acme,10) } Generate hash chain: { contract(h_10) } h_10, h_9, ..., h_1 h_9 G. Navarro et al. (UAB) CADAT NordSec 2004 5 / 15

  13. Example Initialization Example: first use AcmeNews Alice { contract(acme,10) } Generate hash chain: { contract(h_10) } h_10, h_9, ..., h_1 h_9 h_8 G. Navarro et al. (UAB) CADAT NordSec 2004 5 / 15

  14. Example Token delgation Example: token delegation ScienceNews AcmeNews Alice G. Navarro et al. (UAB) CADAT NordSec 2004 6 / 15

  15. Example Token delgation Example: token delegation ScienceNews AcmeNews Alice { token-deleg(h_8) } G. Navarro et al. (UAB) CADAT NordSec 2004 6 / 15

  16. Example Token delgation Example: token delegation ScienceNews AcmeNews Alice { token-deleg(h_8) } h_7 G. Navarro et al. (UAB) CADAT NordSec 2004 6 / 15

  17. Example Token delgation Example: token delegation ScienceNews AcmeNews Alice { token-deleg(h_8) } h_7 h_6 G. Navarro et al. (UAB) CADAT NordSec 2004 6 / 15

  18. Example Chain delegation Example: chain delegation AcmeNews Alice Bob G. Navarro et al. (UAB) CADAT NordSec 2004 7 / 15

  19. Example Chain delegation Example: chain delegation AcmeNews Alice Bob { chain-deleg(h_6) } G. Navarro et al. (UAB) CADAT NordSec 2004 7 / 15

  20. Example Chain delegation Example: chain delegation AcmeNews Alice Bob { chain-deleg(h_6) } h_5 G. Navarro et al. (UAB) CADAT NordSec 2004 7 / 15

  21. Example Chain delegation Example: chain delegation AcmeNews Alice Bob { chain-deleg(h_6) } h_5 h_4 G. Navarro et al. (UAB) CADAT NordSec 2004 7 / 15

  22. Delegation in CADAT CADAT & Delegation token-delegation: delegatee is the consumer of tokens, who offers the service (aka server-side delegation). chain-delegation: delegatee is the user of the tokens, who access the service (aka client-side delegation). G. Navarro et al. (UAB) CADAT NordSec 2004 8 / 15

  23. Delegation in CADAT CADAT & Delegation token-delegation: delegatee is the consumer of tokens, who offers the service (aka server-side delegation). chain-delegation: delegatee is the user of the tokens, who access the service (aka client-side delegation). G. Navarro et al. (UAB) CADAT NordSec 2004 8 / 15

  24. Implementation and Applications Implementation Implementation CADAT is implemented in Java. Contracts and delegations encoded as SPKI/SDSI authorization certificates . Basic functionality provided by JSDSI ; Chain discovery algorithm = ⇒ all computations needed by CATAD. Extended to support hash chain verification in the algorithm. G. Navarro et al. (UAB) CADAT NordSec 2004 9 / 15

  25. Implementation and Applications Implementation Implementation CADAT is implemented in Java. Contracts and delegations encoded as SPKI/SDSI authorization certificates . Basic functionality provided by JSDSI ; Chain discovery algorithm = ⇒ all computations needed by CATAD. Extended to support hash chain verification in the algorithm. G. Navarro et al. (UAB) CADAT NordSec 2004 9 / 15

  26. Implementation and Applications Implementation Implementation CADAT is implemented in Java. Contracts and delegations encoded as SPKI/SDSI authorization certificates . Basic functionality provided by JSDSI ; Chain discovery algorithm = ⇒ all computations needed by CATAD. Extended to support hash chain verification in the algorithm. G. Navarro et al. (UAB) CADAT NordSec 2004 9 / 15

  27. Implementation and Applications SPKI cert without using full tag intersection Token as SPKI authorization certificate Partial tag intersection Authorization token: p = ( cid , i , h i ( m )) Token-cert without hash verification (cert (issuer ...) (subject ...) (tag (h-chain-id |123456789|) (h-chain-index (* range numeric ge 7))) (comment (h-val (hash md5 |899b786bf7dfad58aa3844f2489aa5bf|)))) G. Navarro et al. (UAB) CADAT NordSec 2004 10 / 15

  28. Implementation and Applications SPKI cert without using full tag intersection Token as SPKI authorization certificate Partial tag intersection Authorization token: p = ( cid , i , h i ( m )) Token-cert without hash verification (cert (issuer ...) (subject ...) (tag (h-chain-id |123456789|) (h-chain-index (* range numeric ge 7))) (comment (h-val (hash md5 |899b786bf7dfad58aa3844f2489aa5bf|)))) G. Navarro et al. (UAB) CADAT NordSec 2004 10 / 15

  29. Implementation and Applications SPKI cert using full tag intersection Token as SPKI authorization certificate Full tag intersection Authorization token: p = ( cid , i , h i ( m )) Token-cert with hash verification (cert (issuer ...) (subject ...) (tag (hash-auth (hchain-id |lksjfSDFIsdfkj0sndKIShfoMSKJSD|) (hchain-index 15) (hash md5 |d52885e0c4bc097f6ba3b4622e147c30|)))) G. Navarro et al. (UAB) CADAT NordSec 2004 11 / 15

  30. Implementation and Applications SPKI cert using full tag intersection Token as SPKI authorization certificate Full tag intersection Authorization token: p = ( cid , i , h i ( m )) Token-cert with hash verification (cert (issuer ...) (subject ...) (tag (hash-auth (hchain-id |lksjfSDFIsdfkj0sndKIShfoMSKJSD|) (hchain-index 15) (hash md5 |d52885e0c4bc097f6ba3b4622e147c30|)))) G. Navarro et al. (UAB) CADAT NordSec 2004 11 / 15

  31. Implementation and Applications SPKI cert using full tag intersection Applications Generic token-based access control system. Micropayment schemes. Current application: Token-based access control for mobile agents . G. Navarro et al. (UAB) CADAT NordSec 2004 12 / 15

  32. Implementation and Applications SPKI cert using full tag intersection Applications Generic token-based access control system. Micropayment schemes. Current application: Token-based access control for mobile agents . G. Navarro et al. (UAB) CADAT NordSec 2004 12 / 15

  33. Implementation and Applications SPKI cert using full tag intersection Applications Generic token-based access control system. Micropayment schemes. Current application: Token-based access control for mobile agents . G. Navarro et al. (UAB) CADAT NordSec 2004 12 / 15

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend