A Model for Constraint and Delegation Management

被引:0
作者
Pham, Quan [1 ]
Reid, Jason [1 ]
Dawson, Ed [1 ]
机构
[1] Queensland Univ Technol, Informat Secur Inst, Brisbane, Qld 4000, Australia
来源
INFORMATION SECURITY PRACTICE AND EXPERIENCE | 2011年 / 6672卷
关键词
Delegation; Constraint management; Access control and Distributed systems;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces a model to facilitate delegation, including ad-hoc delegation, in cross security domain activities. Specifically, this paper proposes a novel delegation constraint management model to manage and track delegation constraints across security domains. A procedure to trace the authority of delegation constraints is introduced as well as a procedure to form a delegation constraint set and detect/prevent potential conflicts.
引用
收藏
页码:362 / 371
页数:10
相关论文
共 10 条
[1]  
[Anonymous], LECT NOTES COMPUTER
[2]  
Bertino E., 1999, ACM Trans. Inf. Syst. Secur., V2, P65, DOI 10.1145/300830.300837
[3]   X-FEDERATE: A policy engineering framework for federated access management [J].
Bhatti, Rafae ;
Bertino, Elisa ;
Ghafoor, Arif .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2006, 32 (05) :330-346
[4]  
Botha R. A., 2001, Information Management & Computer Security, V9, P126, DOI 10.1108/09685220110394848
[5]  
Damianou N, 2001, LECT NOTES COMPUT SC, V1995, P18
[6]  
OASIS, 2009, XACML V3 0 ADM DEL P
[7]  
SCHAAD A, 2003, THESIS U YORK YORK
[8]  
Tamassia R., 2004, SACMAT 04, P146
[9]  
WANG H, 2006, SACMAT 06, P91
[10]  
[No title captured]