Cryptographic Enforcement of Segregation of Duty
Cryptographic Enforcement of Segregation of Duty
Thomas Maus
published in Magdeburger Journal zur Sicherheitsforschung (2017, #14, p. 858-870)
Workflows with Segregation-of-Duty requirements or involving multiple parties with non-aligned interests (typically mutually distrustful) pose interesting challenges in often neglected security dimensions. Cryptographic approaches are presented to technically enforce strict auditability, traceability and multi-partyauthorized access control, and thus also enable exoneration from allegations. These ideas are illustrated by challenging examples - constructing various checks and balances for Telecommunications data retention, a vividly discussed and widely known issue. This article appears in the special edition „In Depth Security – Proceedings of the DeepSec Conferences Vol. 2“. Edited by Stefan Schumacher and René Pfeiffer
BibTeX-Entry für mjs:Maus:Crypto
1@article{mjs:Maus:Crypto,
2 author = {Thomas Maus},
3 title = {Cryptographic Enforcement of Segregation of Duty},
4 pages = {858-870},
5 year = {2017},
6 keywords = {mjsarticle,ds17,Cryptography,Segregation-of-Duty},
7 journaltitle = {Magdeburger Journal zur Sicherheitsforschung},
8 issn = {2192-4260},
9 url = {https://d-nb.info/1150680091/34},
10 codeberg = {https://codeberg.org/0xKaishakunin/Publikationen/src/branch/main/MagdeburgerJournalSicherheitsforschung/MJS_057_Maus_Segregation.pdf},
11 language = {DE},
12 issue = {2},
13 volume = {14},
14 urldate = {2017-09-28},
15 keywords = {mjsarticle,ds17,Cryptography,Segregation-of-Duty},
16 abstract = {Workflows with Segregation-of-Duty requirements or involving multiple parties with non-aligned interests (typically mutually distrustful) pose interesting challenges in often neglected security dimensions. Cryptographic approaches are presented to technically enforce strict auditability, traceability and multi-partyauthorized access control, and thus also enable exoneration from allegations. These ideas are illustrated by challenging examples - constructing various checks and balances for Telecommunications data retention, a vividly discussed and widely known issue. This article appears in the special edition „In Depth Security – Proceedings of the DeepSec Conferences Vol. 2“. Edited by Stefan Schumacher and René Pfeiffer},
17}
AsciiDoc citation commands
1. citenp:[mjs:Maus:Crypto]
2. cite:[mjs:Maus:Crypto]
3. bibitem[mjs:Maus:Crypto]
LaTeX citation commands
1. \textcite{mjs:Maus:Crypto}
2. \parencite{mjs:Maus:Crypto}
3. \cite{mjs:Maus:Crypto}
generated at Mon May 12 10:48:34 2025