About InfoWorld : Advertise : Subscribe : Contact Us : Awards : Events : Store
InfoWorld - Technology Information for Business Intelligence InfoWorld HomeTechnology NewsTechnology Test CenterOpinionsTechnology Product GuideTechnology Index
 COLUMN ARCHIVES
SiteIT Product Guide Search
 
FREE TECHNOLOGY NEWSLETTERS
Wireless Report
Government Channel Report


Permissions on the edge

The way out of the digital rights tangle: Trust but verify

Strategic Developer, By  Jon Udell  
September 26, 2003

Managing digital rights is one of the nastiest problems bedeviling any security architecture. Multiply the number of secured objects by the number of ACL (access control list) entries and you get a number you'd rather not contemplate. Big matrices of objects and permissions are so unwieldy that some say we should avoid creating them in the first place.

SPONSOR

"DITA Detours: Bypass Four Costly Roadblocks"

Sponsored by Innodata Isogen

SPONSOR

FREE White Paper: An Innovative Approach to Managing Software Requirements

Sponsored by MKS

In a speech he gave last year to the Security Industries Middleware Council, Dan Geer, CTO of @Stake, famously remarked that ACLs don't scale and then proposed accountability as an alternative that does. "The only reason a free society works," said Geer, "is that you can pretty much do anything, though if you screw up badly, we will find you and make you pay." Given that our ability to comprehend big matrices holds constant while storage capacity and CPU power keep growing, Geer suggests that passive surveillance and data mining can achieve what active policy cannot.

Even if you buy that argument, though, you're not off the rights-management hook. Some acts must always be prevented, not just punished; and some people must always be exempt from those prohibitions. It's hard to state these rules and harder still to update them as secured objects and roles vary from day to day. PKI (public key infrastructure) offers some solutions, but not very good ones.

Consider, for example, the mechanisms for revoking a digital ID. As an experiment recently, I revoked one of my own just to see how the e-mail clients that check it would react. Results were mixed. Outlook didn't complain, but Mozilla correctly did. That doesn't bode well for a hypothetical antispam measure that would reject messages based on invalid signatures.

My test only exercised the most basic mechanism, the CRL (certificate revocation list). Even had it worked flawlessly, it wouldn't be a solution. No application could be expected to haul in a million-entry CRL. Thus was born the OCSP (Online Certificate Status Protocol), which enables a client to ask a server to validate a certificate in real time. Great, except now the OCSP server has to be always accessible and do lots of heavy crypto on the fly.

The inevitable next step was to distribute the work, and CoreSteet's D-OCSP (Distributed OCSP) does just that. Its system periodically computes "proofs" — small, time-limited validity tokens — and pushes them to OCSP responders at the edge of the network. The tokens contain no secrets, they merely assert facts about an identity that's established by password, PIN, or some other means.

Other applications of the same technique push beyond the edge of the network. CoreStreet has just signed a deal with Swedish locksmith Assa Abloy that will enable doors to enforce highly granular card access policies without wired (or wireless) connections. When an employee swipes a card at the main entrance, it's refreshed with a daily set of proofs. The door need only check that the proof binds a resource (itself) to an identity (the employee) at a certain time (today).

CoreStreet's president, Phil Libin, sketches another interesting scenario. Suppose an employee needs a proof to access her own laptop but can't contact the network. Since proofs are minimally just 20 bytes, it's feasible to convey one in a phone call.

We'll always have to manage permissions centrally. But CoreStreet's method of distributing them to the edge of the network — and beyond — strikes me as an excellent way to tackle a thorny logistical problem.




 
Jon Udell is lead analyst and blogger in chief at the InfoWorld Test Center.

•  More of Jon Udell's column
•  Jon Udell's Weblog

Newsletter Get Jon's column delivered weekly.
Enter e-mail address:




 

TOP NEWS:


» RIM jumps to 3G on Verizon Wireless
BlackBerry 7130e offers a speed boost

» RSA releases government compliance product
Smart card management product to help U.S. government agencies comply with Homeland Security mandate

» IBM looks to make middleware SMILE
Streams-based technology is in development

» Dell's interest in AMD old story with new twist
The perennial report comes at a time when both companies are at a turning point

» Update: Microsoft to open Office document format
Massachusetts proposal requiring compliance with OpenDocument for government documents is seen as a spur

» Online ad revenue up 34 percent in Q3
Google and Yahoo look to the business model as income source




HIPAA AND BEYOND
Learn how to engage your entire organization in creating an effective HIPPA compliance strategy. Register now to attend this live Webcast, presented by Network Intelligence, Juniper Networks, Siemens, and InfoWorld.

»  Click here to view this Webcast
  VoIP
Learn how to successfully plan, deploy and manage an effective VoIP system. This new InfoWorld IT Strategy Guide is available at no charge for a limited time, compliments of Avaya. Download now.

» Click here to download now


- Special Advertising Partners -
WHITE PAPERS
 
>> WHITE PAPERS LIBRARY

WHITE PAPERS E-MAIL ALERT

Find out when the latest white paper is available:

 

»  Solving the Enterprise Mobility Challenge - What does enterprise mobility really mean? Enabling mobile workers means understanding their mobility profiles and addressing their communication needs with the right combination of technology.
»  "DITA Detours: Bypass Four Costly Roadblocks" - Companies seeking to realize DITA's promised cost savings and productivity improvements need to do more than just install new software. Indeed, they also need to avoid four roadblocks that could ...
»  Business Communications Applications on Any Network - Find out how Business Communications Applications are quickly becoming a requirement for businesses seeking competitive differentiation through increased business agility and how Avaya is mapping out ...
»  New Era of Intelligent Communications: Executive Presentation
»  High-Speed Outdoor Wireless Bridges from LightPointe
»  Information Management for Compliance: Supporting Compliance-Related Processes, Mitigating Risk, and Managing Costs

 
MORE APPLICATION DEVELOPMENT WHITE PAPERS


WHITE PAPERS BY TOPIC


• Application development
• Applications
• Business
• Hardware
• Networking
• Platforms
• Security
• Standards
• Storage
• Telecom
• Web services
• Wireless
» Efficient load testing of Web Applications
A description of the characteristics automated test tools must have for efficient testing of complex ...
» Step-by-Step Guide to Testing Your Web Application
This checklist for testing web applications covers the most critical items in making sure a web ...
» Web threats are evolving. Is your security?
Threats from email & web are converging as malware authors turn their attention to the Web. ...

 
SPONSORED LINKS  

»  SSA Global - Start responding to customer demand in real time. Now.
»  Verisign - VeriSign SSL Certificates secure e-commerce transactions.
»  Optimum Lightpath - Save big $ on communications NOW - NY metro area.
»  IBM - WebSphere live for SOA. Discover new solutions to advance your SOA. Click here.
»  OkiData - OKI Printing Solutions – Click to Save Now, It’s Good Math
 


INFOWORLD MARKETPLACE


» Download Free SQL Anywhere Developer Edition
SQL Anywhere® provides enterprise performance and rich database functionality with minimal ...
» Worksoft. No scripting. No coding. No kidding.
Never rely on manual software testing again. Get automated testing that requires no programming. ...
» Buy Microsoft Visual Basic
Shop AtomicPark.com for Microsoft Visual Basic Software and get free shipping plus a 30-day ...
» AutomatedQA - Lifecycle Management Tools
AutomatedQA offers award winning solutions for Automated Testing, Performance Profiling, Project ...
» Anatomy of a Native XML Database
Learn about the design and architecture of a native XML database, how it gives developers great ...


 

FREE SUBSCRIPTION


Order today to get your FREE subscription (a $195 value!) to InfoWorld magazine, the weekly publication that provides indispensable product information to IT professionals.

NOTE: Complimentary subscriptions sent only to those applicants who qualify.

First Name:
Last Name:
Company Name:
Title:
Mailing Address:
City:
State/Province:
Zip/Postal Code:
Email Address:


NOTE: Offer valid in U.S. and Canada only
Non-U.S. click here

FIND PRODUCTS AND COMPANIES
» COMPLETE PRODUCT GUIDE

TECHNOLOGY INDEX

TECH WATCH 


Mono is upgraded
Mono, which is an open source platform for developing and running .Net applications on multiple operating systems, has been upgraded. Version 1.1.10 of Mono offers ASP.Net application configuration capabilities and the ability to work with virtual ...

Microsoft open Office shot heard around the world
Microsoft's announcement Monday that it will offer its Word, Excel and PowerPoint document formats as open standards creates a tremor in the software industry that will be felt far and wide. "We have a few barriers [with government contracts]," said ...

COLUMNISTS

Get the most from your host
Oliver Rist's Column and Blog (InfoWorld) - All of a sudden, hosted software is the belle of the ball. When folks first thought...
» MORE COLUMNISTS

MORE INFOWORLD BLOGS


The Gripe Line 
Sony's DRM Profile
You're probably getting tired of hearing about Sony BMG's rootkit DRM, but one central mystery about it remains to be ...

Zero Day 
Microsoft IE Zero Day Vulnerability
A UK group known as 'Computer Terrorism' has released a proof of concept zero day exploit for fully patched Windows ...




IDG ENTERPRISE NETWORK
• Seeing Through the Fog of Data  (CIO)
• The Time Is Now  (CIO)

GOVERNMENT IT & POLICY
• World Digital Library Planned
• Hackers Targeting Security Programs
• Costliest Part of Gulf Rebuilding Yet to Come

ADVERTISEMENT


 HOME  NEWS  TEST CENTER  OPINIONS  PRODUCT GUIDE  TECHINDEX   About :: Advertise :: Subscribe :: Contact Us :: Awards :: Events 

Copyright © 2005, Reprints, Permissions, Licensing, IDG Network, Privacy Policy.
All Rights reserved. InfoWorld is a leading publisher of technology information and product reviews on topics including viruses, phishing, worms, firewalls, security, servers, storage, networking, wireless, databases, and web services.

Computerworld :: Network World :: CIO :: PC World :: Darwin :: CMO :: CSO :: Bio-IT World
IT Careers :: JavaWorld :: Macworld :: Mac Central :: Playlist :: GamePro :: GameStar :: Gamerhelp
ITWorld Canada :: Computerwoche :: Techworld UK :: tecChannel :: IDG.se :: IDG.no