18.11.2014 Views

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

From all those possibilities, one realizes that it should be possible to let the author<br />

specify which signatures are required for the electronic document he creates. The process<br />

would then become similar to the way it is done with paper documents. This would allow<br />

applications performing digital signature validation to gather i<strong>de</strong>ntity and authorization<br />

requirements directly from the document. Those requirements would then be enforced<br />

against the PKCs and ACs present in the signatures.<br />

In or<strong>de</strong>r to address this necessity, we propose to bind i<strong>de</strong>ntity and authorization<br />

requirements to a document through a creator signature. For this, we introduce a new<br />

signed signature attribute.<br />

The structure of the paper is as follows. In Section 2 we briefly <strong>de</strong>scribe Attribute<br />

Certificates and the support offered by digital signature standards CAdES and XAdES<br />

to the inclusion of these certificates. Section 3 <strong>de</strong>scribes different alternatives for the inclusion<br />

of authorization constraints in a document. Section 4 proposes the concept of<br />

a creator signature and introduces a new signed signature attribute. Section 5 discusses<br />

advantages and limitations of the proposed solution in comparison to the existing alternatives.<br />

Section 6 conclu<strong>de</strong>s the paper and <strong>de</strong>scribes future work.<br />

2. Attribute Certificates and Digital Signature Standards<br />

The digital signature standards CAdES[ETSI 2011] and XAdES[ETSI 2010] currently<br />

support the use of X.509 Attribute Certificates [Farrell et al. 2010] to carry the signatories’<br />

authorization cre<strong>de</strong>ntials within the signature.<br />

X.509 Attribute Certificates(ACs) are certificates that can provi<strong>de</strong> authorization<br />

information about a given entity. They are issued by an Authorization Authority(AA) and<br />

they reference a single Public Key Certificate(PKC) [Cooper et al. 2008]. These certificates<br />

are wi<strong>de</strong>ly used in access control schemes. A well know example is the Permis<br />

Project[Chadwick and Otenko 2002].<br />

The CAdES and XAdES digital signature standards are respectively evolutions<br />

of the Cryptographic Message Syntax(CMS) [Housley 2009] and XML Signature Syntax<br />

and Processing(XMLDSIG)[Eastlake et al. 2002] formats. They <strong>de</strong>fine the attributes that<br />

can be present in a digital signature and how those attributes shall be interpreted. Those<br />

attributes are classified as signed or unsigned attributes. Signed attributes are inclu<strong>de</strong>d in<br />

the signature container before the actual signature value is calculated, therefore becoming<br />

part of the signed content along with the document’s content itself. Thus, these attributes<br />

cannot be altered after the signature is completed. An example of a signed attribute is the<br />

Signing Certificate attribute, which holds a reference of the signatory’s PKC. Unsigned<br />

attributes, in the other hand, are inclu<strong>de</strong>d in the signature container after the signature<br />

value calculation. These attributes can be altered at any time. They are used mainly to<br />

carry validation data, as certificates and certificate revocation data, and artifacts to extend<br />

the lifetime os the signature, such as timestamps.<br />

ACs can be inclu<strong>de</strong>d in a CAdES signature with a signed attribute called signer-<br />

Attributes. The equivalent in XAdES is the signed property signerRoles.<br />

398

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!