trust management

Trust Management systems are trust infrastructures that support authorization for security-critical actions in decentralized environments. We investigate extension suitable for multi-domain applications in variable-threat environments that allow for temporary adjustments of trust levels in response to elevated threat levels, and which can be reversed without compromising actions that took place during such periods—we term this, rollback-access. We argue that a rollback-access capability is an essential feature for security-critical applications, and propose a working prototype for an agent based implementation.

Publications

  • Hu, J., & Burmester, M. Establishing a PKI in an Open Adversarial Environment. In 9th IEEE International Conference on Networking, Architecture, and Storage (NAS) (pp. 73-77). Tianjin, China, 2013.
  • Jenkins, J., Easton, S., Guidry, D., Burmester, M., Liu, X., Yuan, S., Laurence, J., & Ty, S. Trusted Group Key Management For Real-Time Critical Infrastructure Protection. In 32nd annual Military Communications Conference, MILCOM 2013 (pp. 6). IEEE Communication Society, 2013.
  • Burmester, M. A Trusted Computing Architecture for Critical Infrastructure Protection. In Nikolaos Bourbakis, George A. Tsihrintzis, Maria Virvou, & Despina Kavraki (Eds.), Fourth International Conference on Information, Intelligence, Systems and Applications (IISA 2013) (pp. 1-6). Piraeus - Athens, 2013.
  • Burmester, M., Magkos, E., & Chrissikopulos, V. T-ABAC: An Attribute-Based Access Control Model for Real-Time Availability in Highly Dynamic Systems. In Ivina Brandic, Stipe Celar, Hrvoje Dujmic, & Tajana Simunic Rosing (Eds.), Eighth IEEE Symposium on Computers and Communications (ISCC'13) (pp. 6). Split, Croatia, IEEE, 2013.
  • Burmester, M. Trusted Computing. In James Clark, Rebecca Wright, Julie Grady, Aljosa Pasic, Siani R Pearson, & Keyun Ruan (Eds.), DIMAC/BIC/A4Cloud/CSA International Workshop on Trustworthiness, Accountability and Forensics in the Cloud (TAFC) (pp. 6). Malaga, Spain, DIMACS, 2013.
  • Burmester, M., Laurence, J., Guidry, D., Easton, S., Ty, S., Liu, X., Yan, X., and Jenkins, J. Towards a Secure Electricity Grid. In IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) (pp. 6). Melbourne, Australia, 2013.
  • Jenkins, J. and Burmester, M. (2013). Trusted Computing for Critical Infrastructure Protection Against Real-time and Run-time Threats. In Jonathan Butts, & Sujeet Shenoi (Eds.), Seventh Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection (pp. 12), Washington, DC, IFIP 2013.
  • Kotzanikolaou, P., Avramidis, A., Douligeris, C., and Burmester, M. Chord-PKI: A distributed trust infrastructure based on P2P networks. Computer Networks, 56(1), 378-398, 2012.
  • Burmester, M. Trust Models for Ubiquitous Mobile Systems. In Humphry Hung, Y H Wong, & Vincent Cho (Eds.), Ubiquitous Commerce for Creating the Personalized Marketplace: Concepts for Next Generation Adoption (pp. 249-254). Idea Group Inc, Hershey, PA, 2009.
  • Hu, J. and Burmester, M. Cooperation in Mobile Ad Hoc Networks. In Sudip Misra, Isaac Wounsang, & Subhas Misra (Eds.), Guide to Wireless Ad Hoc Networks (pp. 43-58). London, Springer-Verlag, 2009.
  • Mike Burmester, Prasanta Das, Martin Edwards and Alec Yasinsac. `Multi-Domain trust managerment in variable threat environments using rollback-access'. Military Communications Conference, 2008 (MILCOM 2008), IEEE, San Diego, November 17-19, 2008.
  • Mike Burmester and Yvo Desmedt. `Hierarchical Public-Key Certification: The Next Target for Hackers?' Communications of the ACM, 47(8), pp. 86--74, August 2004.
  • Yvo Desmedt and Mike Burmester. `Identity Based Key Infrastructures'. Proceedings of the IFIP World Computer Congress (WCC2004-SEC), Toulouse, France, August 22-27, 2004.
  • Mike Burmester, Yvo Desmedt and Yongue Wang. `A critical analysis of models for fault-tolerant and secure communication'. Communication, Network and Information Security 2003, Dec 10-12, New York, pp.147-152, 2003.
  • Yvo Desmedt, Mike Burmester and Yongue Wang. `Using economics to model threats and security in distributed computing', Extended Abstract. Workshop on Economics and Information Security, University of California, Berkeley, May 16-17, 2002.
  • Mike Burmester and Yvo Desmedt, `Secure Communication in an Unknown Network Using Certificates', Advances in Cryptology - Asiacrypt '99, Lecture Notes in Computer Science 1716, Springer, Berlin, pp. 274--287, 1999.
  • Mike Burmester, Yvo Desmedt, Yonggue Wang, `Using Approximation Hardness to Achieve Dependable Computation', Randomization and Approximation Techniques in Computer Science, Lecture Notes in Computer Science 1518, Springer, Berlin, pp. 172--186, 1998.
  • Mike Burmester and Yvo Desmedt, `Secure Communication in an Unknown Network with Byzantine Faults', Electronics Letters, Vol 34(8), pp.~741--742, 1998.
  • Mike Burmester, Yvo Desmedt and Gregori Kabatianski, `Trust and Security: A New Look at the Byzantine Generals Problem', Proceedings of the DIMACS Workshop on Network Threats, December 1996, R.R. Wright, P. Neuman (Eds.), American Mathematical Society, DIMACS Series, 1997.


SAIT Logo FSU Logo