A model for constraint and delegation management
Data(s) |
2011
|
---|---|
Resumo |
This paper introduces a model to facilitate delegation, including ad-hoc delegation, in cross security domain activities. Specifically, this paper proposes a novel delegation constraint management model to manage and track delegation constraints across security domains. An algorithm to trace the authority of delegation constraints is introduced as well as an algorithm to form a delegation constraint set and detect/prevent potential conflicts. The algorithms and the management model are built upon a set of formal definitions of delegation constraints. |
Formato |
application/pdf |
Identificador | |
Relação |
http://eprints.qut.edu.au/39771/1/39771.pdf Pham, Quan, Reid, Jason F., & Dawson, Edward (2011) A model for constraint and delegation management. In The 7th Information Security Practice and Experience Conference (ISPEC 2011), 30th May - 1st June 2011, Guangzhou, China. |
Direitos |
Copyright 2010 The authors. |
Fonte |
Faculty of Science and Technology; Information Security Institute |
Palavras-Chave | #080303 Computer System Security #Delegation #Constraint management #Access control #Distributed system |
Tipo |
Conference Paper |