chained and delegable authorization tokens
play

Chained and Delegable Authorization Tokens G. Navarro J. Garca J. - PowerPoint PPT Presentation

Chained and Delegable Authorization Tokens G. Navarro J. Garca J. A. Ortega-Ruiz Dept. of Computer Science Universitat Autnoma de Barcelona NordSec 2004 G. Navarro et al. (UAB) CADAT NordSec 2004 1 / 15 Outline Introduction 1


  1. Chained and Delegable Authorization Tokens G. Navarro J. García J. A. Ortega-Ruiz Dept. of Computer Science Universitat Autònoma de Barcelona NordSec 2004 G. Navarro et al. (UAB) CADAT NordSec 2004 1 / 15

  2. Outline Introduction 1 Example 2 Initialization Token delgation Chain delegation 3 Delegation in CADAT Implementation and Applications 4 Implementation SPKI cert without using full tag intersection SPKI cert using full tag intersection 5 Conclusions G. Navarro et al. (UAB) CADAT NordSec 2004 2 / 15

  3. Outline Introduction 1 Example 2 Initialization Token delgation Chain delegation 3 Delegation in CADAT Implementation and Applications 4 Implementation SPKI cert without using full tag intersection SPKI cert using full tag intersection 5 Conclusions G. Navarro et al. (UAB) CADAT NordSec 2004 3 / 15

  4. Introduction Chained And Delegable Authorization Tokens Hash chains as chains of authorization tokens. tokens represent generic authorizations (not just micropayments). Delegation delegation of chains or subchains. Implemented with a trust management infrastructure. CADAT C hained A nd D elegable A uthorization T okens G. Navarro et al. (UAB) CADAT NordSec 2004 4 / 15

  5. Introduction Chained And Delegable Authorization Tokens Hash chains as chains of authorization tokens. tokens represent generic authorizations (not just micropayments). Delegation delegation of chains or subchains. Implemented with a trust management infrastructure. CADAT C hained A nd D elegable A uthorization T okens G. Navarro et al. (UAB) CADAT NordSec 2004 4 / 15

  6. Introduction Chained And Delegable Authorization Tokens Hash chains as chains of authorization tokens. tokens represent generic authorizations (not just micropayments). Delegation delegation of chains or subchains. Implemented with a trust management infrastructure. CADAT C hained A nd D elegable A uthorization T okens G. Navarro et al. (UAB) CADAT NordSec 2004 4 / 15

  7. Introduction Chained And Delegable Authorization Tokens Hash chains as chains of authorization tokens. tokens represent generic authorizations (not just micropayments). Delegation delegation of chains or subchains. Implemented with a trust management infrastructure. CADAT C hained A nd D elegable A uthorization T okens G. Navarro et al. (UAB) CADAT NordSec 2004 4 / 15

  8. Introduction Chained And Delegable Authorization Tokens Hash chains as chains of authorization tokens. tokens represent generic authorizations (not just micropayments). Delegation delegation of chains or subchains. Implemented with a trust management infrastructure. CADAT C hained A nd D elegable A uthorization T okens G. Navarro et al. (UAB) CADAT NordSec 2004 4 / 15

  9. Example Initialization Example: first use AcmeNews Alice { contract(acme,10) } Generate hash chain: h_10, h_9, ..., h_1 G. Navarro et al. (UAB) CADAT NordSec 2004 5 / 15

  10. Example Initialization Example: first use AcmeNews Alice { contract(acme,10) } Generate hash chain: h_10, h_9, ..., h_1 G. Navarro et al. (UAB) CADAT NordSec 2004 5 / 15

  11. Example Initialization Example: first use AcmeNews Alice { contract(acme,10) } Generate hash chain: { contract(h_10) } h_10, h_9, ..., h_1 G. Navarro et al. (UAB) CADAT NordSec 2004 5 / 15

  12. Example Initialization Example: first use AcmeNews Alice { contract(acme,10) } Generate hash chain: { contract(h_10) } h_10, h_9, ..., h_1 h_9 G. Navarro et al. (UAB) CADAT NordSec 2004 5 / 15

  13. Example Initialization Example: first use AcmeNews Alice { contract(acme,10) } Generate hash chain: { contract(h_10) } h_10, h_9, ..., h_1 h_9 h_8 G. Navarro et al. (UAB) CADAT NordSec 2004 5 / 15

  14. Example Token delgation Example: token delegation ScienceNews AcmeNews Alice G. Navarro et al. (UAB) CADAT NordSec 2004 6 / 15

  15. Example Token delgation Example: token delegation ScienceNews AcmeNews Alice { token-deleg(h_8) } G. Navarro et al. (UAB) CADAT NordSec 2004 6 / 15

  16. Example Token delgation Example: token delegation ScienceNews AcmeNews Alice { token-deleg(h_8) } h_7 G. Navarro et al. (UAB) CADAT NordSec 2004 6 / 15

  17. Example Token delgation Example: token delegation ScienceNews AcmeNews Alice { token-deleg(h_8) } h_7 h_6 G. Navarro et al. (UAB) CADAT NordSec 2004 6 / 15

  18. Example Chain delegation Example: chain delegation AcmeNews Alice Bob G. Navarro et al. (UAB) CADAT NordSec 2004 7 / 15

  19. Example Chain delegation Example: chain delegation AcmeNews Alice Bob { chain-deleg(h_6) } G. Navarro et al. (UAB) CADAT NordSec 2004 7 / 15

  20. Example Chain delegation Example: chain delegation AcmeNews Alice Bob { chain-deleg(h_6) } h_5 G. Navarro et al. (UAB) CADAT NordSec 2004 7 / 15

  21. Example Chain delegation Example: chain delegation AcmeNews Alice Bob { chain-deleg(h_6) } h_5 h_4 G. Navarro et al. (UAB) CADAT NordSec 2004 7 / 15

  22. Delegation in CADAT CADAT & Delegation token-delegation: delegatee is the consumer of tokens, who offers the service (aka server-side delegation). chain-delegation: delegatee is the user of the tokens, who access the service (aka client-side delegation). G. Navarro et al. (UAB) CADAT NordSec 2004 8 / 15

  23. Delegation in CADAT CADAT & Delegation token-delegation: delegatee is the consumer of tokens, who offers the service (aka server-side delegation). chain-delegation: delegatee is the user of the tokens, who access the service (aka client-side delegation). G. Navarro et al. (UAB) CADAT NordSec 2004 8 / 15

  24. Implementation and Applications Implementation Implementation CADAT is implemented in Java. Contracts and delegations encoded as SPKI/SDSI authorization certificates . Basic functionality provided by JSDSI ; Chain discovery algorithm = ⇒ all computations needed by CATAD. Extended to support hash chain verification in the algorithm. G. Navarro et al. (UAB) CADAT NordSec 2004 9 / 15

  25. Implementation and Applications Implementation Implementation CADAT is implemented in Java. Contracts and delegations encoded as SPKI/SDSI authorization certificates . Basic functionality provided by JSDSI ; Chain discovery algorithm = ⇒ all computations needed by CATAD. Extended to support hash chain verification in the algorithm. G. Navarro et al. (UAB) CADAT NordSec 2004 9 / 15

  26. Implementation and Applications Implementation Implementation CADAT is implemented in Java. Contracts and delegations encoded as SPKI/SDSI authorization certificates . Basic functionality provided by JSDSI ; Chain discovery algorithm = ⇒ all computations needed by CATAD. Extended to support hash chain verification in the algorithm. G. Navarro et al. (UAB) CADAT NordSec 2004 9 / 15

  27. Implementation and Applications SPKI cert without using full tag intersection Token as SPKI authorization certificate Partial tag intersection Authorization token: p = ( cid , i , h i ( m )) Token-cert without hash verification (cert (issuer ...) (subject ...) (tag (h-chain-id |123456789|) (h-chain-index (* range numeric ge 7))) (comment (h-val (hash md5 |899b786bf7dfad58aa3844f2489aa5bf|)))) G. Navarro et al. (UAB) CADAT NordSec 2004 10 / 15

  28. Implementation and Applications SPKI cert without using full tag intersection Token as SPKI authorization certificate Partial tag intersection Authorization token: p = ( cid , i , h i ( m )) Token-cert without hash verification (cert (issuer ...) (subject ...) (tag (h-chain-id |123456789|) (h-chain-index (* range numeric ge 7))) (comment (h-val (hash md5 |899b786bf7dfad58aa3844f2489aa5bf|)))) G. Navarro et al. (UAB) CADAT NordSec 2004 10 / 15

  29. Implementation and Applications SPKI cert using full tag intersection Token as SPKI authorization certificate Full tag intersection Authorization token: p = ( cid , i , h i ( m )) Token-cert with hash verification (cert (issuer ...) (subject ...) (tag (hash-auth (hchain-id |lksjfSDFIsdfkj0sndKIShfoMSKJSD|) (hchain-index 15) (hash md5 |d52885e0c4bc097f6ba3b4622e147c30|)))) G. Navarro et al. (UAB) CADAT NordSec 2004 11 / 15

  30. Implementation and Applications SPKI cert using full tag intersection Token as SPKI authorization certificate Full tag intersection Authorization token: p = ( cid , i , h i ( m )) Token-cert with hash verification (cert (issuer ...) (subject ...) (tag (hash-auth (hchain-id |lksjfSDFIsdfkj0sndKIShfoMSKJSD|) (hchain-index 15) (hash md5 |d52885e0c4bc097f6ba3b4622e147c30|)))) G. Navarro et al. (UAB) CADAT NordSec 2004 11 / 15

  31. Implementation and Applications SPKI cert using full tag intersection Applications Generic token-based access control system. Micropayment schemes. Current application: Token-based access control for mobile agents . G. Navarro et al. (UAB) CADAT NordSec 2004 12 / 15

  32. Implementation and Applications SPKI cert using full tag intersection Applications Generic token-based access control system. Micropayment schemes. Current application: Token-based access control for mobile agents . G. Navarro et al. (UAB) CADAT NordSec 2004 12 / 15

  33. Implementation and Applications SPKI cert using full tag intersection Applications Generic token-based access control system. Micropayment schemes. Current application: Token-based access control for mobile agents . G. Navarro et al. (UAB) CADAT NordSec 2004 12 / 15

Recommend


More recommend