Cryptographic Enforcement of Segregation of Duty

Cryptographic Enforcement of Segregation of Duty

Thomas Maus

published in Magdeburger Journal zur Sicherheitsforschung (2017, #14, p. 858-870)

Info

Workflows with Segregation-of-Duty requirements or involving multiple parties with non-aligned interests (typically mutually distrustful) pose interesting challenges in often neglected security dimensions. Cryptographic approaches are presented to technically enforce strict auditability, traceability and multi-partyauthorized access control, and thus also enable exoneration from allegations. These ideas are illustrated by challenging examples - constructing various checks and balances for Telecommunications data retention, a vividly discussed and widely known issue. This article appears in the special edition „In Depth Security – Proceedings of the DeepSec Conferences Vol. 2“. Edited by Stefan Schumacher and René Pfeiffer

BibTeX-Entry für mjs:Maus:Crypto

 1@article{mjs:Maus:Crypto,
 2  author = {Thomas Maus},
 3  title = {Cryptographic Enforcement of Segregation of Duty},
 4  pages = {858-870},
 5  year = {2017},
 6  keywords = {mjsarticle,ds17,Cryptography,Segregation-of-Duty},
 7  journaltitle = {Magdeburger Journal zur Sicherheitsforschung},
 8  issn = {2192-4260},
 9  url = {https://d-nb.info/1150680091/34},
10  codeberg = {https://codeberg.org/0xKaishakunin/Publikationen/src/branch/main/MagdeburgerJournalSicherheitsforschung/MJS_057_Maus_Segregation.pdf},
11  language = {DE},
12  issue = {2},
13  volume = {14},
14  urldate = {2017-09-28},
15  keywords = {mjsarticle,ds17,Cryptography,Segregation-of-Duty},
16  abstract = {Workflows with Segregation-of-Duty requirements or involving multiple parties with non-aligned interests (typically mutually distrustful) pose interesting challenges in often neglected security dimensions. Cryptographic approaches are presented to technically enforce strict auditability, traceability and multi-partyauthorized access control, and thus also enable exoneration from allegations. These ideas are illustrated by challenging examples - constructing various checks and balances for Telecommunications data retention, a vividly discussed and widely known issue. This article appears in the special edition „In Depth Security – Proceedings of the DeepSec Conferences Vol. 2“. Edited by Stefan Schumacher and René Pfeiffer},
17}

AsciiDoc citation commands

1. citenp:[mjs:Maus:Crypto]
2. cite:[mjs:Maus:Crypto]
3. bibitem[mjs:Maus:Crypto]

LaTeX citation commands

1. \textcite{mjs:Maus:Crypto}
2. \parencite{mjs:Maus:Crypto}
3. \cite{mjs:Maus:Crypto}

generated at Mon May 12 10:48:34 2025