18.11.2014 Views

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Electronic Documents with Signature Constraints<br />

Felipe C. Werlang 1 , Ricardo F. Custódio 1 , Roberto Araújo 2<br />

1 Departamento <strong>de</strong> Informática e Estatística – Universida<strong>de</strong> Fe<strong>de</strong>ral <strong>de</strong> Santa Catarina (UFSC)<br />

Caixa Postal 476 – 88.040-900 – Florianópolis – SC – Brazil<br />

2 Faculda<strong>de</strong> <strong>de</strong> Computação – Universida<strong>de</strong> Fe<strong>de</strong>ral do Pará (UFPA)<br />

Rua Augusto Corrêa, 01 - Setor Básico – 66075-110 – Belém – PA – Brazil<br />

felipewer@inf.ufsc.br, custodio@inf.ufsc.br, rsa@ufpa.br<br />

Abstract. X.509 Public Key Certificates and Attribute Certificates are well established<br />

technologies. They are employed in digital signatures to prove a signatory’s<br />

i<strong>de</strong>ntity and authorization. However, there is no standard <strong>de</strong>finition for<br />

the way electronic documents should specify the i<strong>de</strong>ntity and the authorization<br />

of required signatories, nor the number of expected signatures. In this paper we<br />

propose to bind i<strong>de</strong>ntity and authorization requirements to a document through<br />

a creator signature. For this, we introduce a new signed signature attribute.<br />

Keywords: Digital Signature, Authorization, Attribute Certificates, Signature<br />

Constraints, Electronic Documents, Authorization Requirements<br />

1. Introduction<br />

Mo<strong>de</strong>rn digital signature standards employ Public Key Certificates (PKCs) to i<strong>de</strong>ntify the<br />

signatories. They also support the inclusion of Attribute Certificates (ACs) in signatures<br />

to provi<strong>de</strong> authorization cre<strong>de</strong>ntials. However, these certificates only certify who signed<br />

a given document and what his attributes were. This does not mean that the signatory had<br />

the authorization to sign that document. We could take, for example, a court injunction.<br />

Although anyone could sign a document containing a court injunction, it only acquires<br />

legal value if signed by a judge. This means that applications enforcing authorization<br />

constraints in digital signatures have to look for a pre<strong>de</strong>fined set of attributes in the signatory’s<br />

AC. That attribute set, in turn, <strong>de</strong>pends directly on the business process in which<br />

the signature is used. Thus, each application ends up tied to a specific business process.<br />

Applications <strong>de</strong>signed to incorporate digital signatures in specific business processes,<br />

with fixed authorization constraints, are quite common. Examples inclu<strong>de</strong> management<br />

systems and communication protocols. Many kinds of forms also tend to have<br />

fixed authorization constraints. However, there are even more cases of documents with<br />

dynamic content and format. Each of these documents may have different authorization<br />

constraints for its signatures. A good example of this is a business contract.<br />

Furthermore, there may be situations where a document has a mix of authorization<br />

and i<strong>de</strong>ntity constraints. For example, a contract between a company and an individual<br />

may require the signature of the company’s director and the signature of the individual. In<br />

this case the first signature has an authorization constraint <strong>de</strong>fined by a role, i.e. Company<br />

Director, and the second signature has an i<strong>de</strong>ntity constraint <strong>de</strong>fined by the individual’s<br />

i<strong>de</strong>ntity.<br />

397

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!