1 / 5

Representation of Trust Model using RDBMs

Representation of Trust Model using RDBMs. Priyank Sharma Colorado State University. The Trust Model. The notion of trust plays a crucial role for the proper formulation of security policies.

chick
Download Presentation

Representation of Trust Model using RDBMs

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Representation of Trust Model using RDBMs Priyank Sharma Colorado State University

  2. The Trust Model • The notion of trust plays a crucial role for the proper formulation of security policies. • A trust management system is a comprehensive framework designed to facilitate the spec., analysis, and management of trust relationship. • This model proposed trust to be represented using a vector of 3 values: Knowledge, Experience, Recommendation. - by Sudip Chakraborty

  3. Trust QL • In order to use Trust Management System, a Trust Query Language is developed. • Query examples: CREATE ENTITY {entity_name} ; SELECT TRUST BETWEEN E1 AND E2 CONTEXT { context_name} POLICY { policy_name}

  4. RDBMS Implementation(1) • In order to these query to be run, they are transformed into corresponding database operation. • Like for query: CREATE ENTITY {entity_name} ; Corresponding database operation should be: INSERT INTO ENTITY {entity_name}; • To implement these sort of operation a database is created with tables like ENTITY, CONTEXT, TRUST, KNOWLEDGE etc.

  5. RDBMS Implementation(2) • Database is already prepared. • We need a compiler that maps these trust query into database operations. • Approach should be to prepare the Lexical analyzer first, for token generation, and then during parsing an intermediate form (which is nothing but database operation) are generated and applied on the database.

More Related