Authorization
Service
Resource
Resource
Authentication
Service
User
Protects(1)Requests
(3)
(2)Authenticates
Credential
Credential
Figure 1: Architecture Overview.
the authentication level specified can be met by legit-
imate users and (iii) enforcement of an access con-
trol can be done based on a specified authentication
level. Regarding authentication level specification,
a resource owner should be able to define first their
preferences of authentication factors, as well as the
authentication level required to get access to their re-
source. Finally, the user should be able to determine if
they can satisfy the required authentication level with
a combination of available authentication factors.
2.1 Methodology
Each authentication factor is associated with an au-
thentication level. The latter is the mapping of au-
thentication factors to confidence values. Resource
owner may specify their preferences in authentication
factors by means of authentication level. The user is
then able to combine available authentication factors
in order to reach the expected authentication level.
Following our approach, a suitable metric for au-
thentication levels is required. For this purpose we
apply subjective logic (Josang, 2001), which supports
the assignment of a confidence value to properties
such as authentication factors. In addition, it is suffi-
ciently extensible to allow us to define a new operator
for authentication level combination. Following this
foundation, based on a resource owner’s confidence
in authentication factors, we are able to define an au-
thentication level policy which maps authentication
levels to authentication factors. Furthermore, relying
on authentication level requirements to resources, we
specify an access control policy featuring an autho-
rization service level. Finally, we define a procedure
so that a user can satisfy the authentication level re-
quirements with a combination of authentication fac-
tors, relying on his available authentication services
and the defined authentication level policy.
2.2 Subjective Logic
Subjective logic is a theoretical framework based on
Dempster-Shafer theory (Shafer, 1976). In subjective
logic, we manipulate opinions about a proposition P.
An opinion is represented by the 4-tuple (b,d,u,a). a
represents the a priori probability of P to be true in
absence of opinion. As we only consider binary state
space for P, we set a to 1/2. b, d and u represent the
belief that P is true, the belief that P is false, and the
uncertainty is the amount of belief that is not commit-
ted to the truth or falseness of P’s respectively. The
range of those four values is [0,1] where b+d+u=1.
The opinion of a subject A about a proposition P is
defined as ω
A
P
= b+au.
Moreover, the subjective logic framework pro-
vides a set of logical operators for combining opin-
ions. Subjective logic provides traditional operators
such as conjunction, disjunction and negation which
corresponds to AND, OR and NOT logical operators
between propositions. Subjective logic supports also
non-traditional operators such as average or discount
of opinions (Josang, 2001).
3 AUTHENTICATION LEVEL
In this section, we explain how we capitalize on sub-
jective logic in order to define and combine authenti-
cation levels.
3.1 Authentication Factor
As depicted in figure 2, an authentication factor is
delivered by an authentication service which imple-
ments an authentication mechanism. Each authenti-
cation mechanism is rated, based on some intrinsic
characteristics called criterion. For example, pass-
word authentication can be characterised by the pass-
word length.
Traditionally, existing authentication factors are
divided in three categories: what a user knows (e.g.
password), what a user has (e.g. credentials), and
what he is (e.g. biometry) (Pfleeger, 1997). In fig-
ure 3, we illustrate an upper view of authentication
mechanisms classification with three classes: token-
based (e.g. X.509 certificate, Kerberos (J.T Kohl,
1994) ticket), knowledge-based (e.g. password) and
biometry (e.g. iris, finger print). This classification
is not exhaustive and can be extended to other au-
thentication mechanisms classes (e.g. time-based au-
thentication). In figure 4, we depict text-based au-
thentication mechanism which is a subset of token-
based authentication mechanisms. Moreover, this fig-
ure shows criterion identified for some text-based au-
thentication mechanisms. The reason for adding cri-
terion on authentication mechanisms is to instantiate
SECRYPT 2007 - International Conference on Security and Cryptography
60