A model for constraint and delegation management


Autoria(s): Pham, Quan; Reid, Jason F.; Dawson, Edward
Data(s)

2011

Resumo

This paper introduces a model to facilitate delegation, including ad-hoc delegation, in cross security domain activities. Specifically, this paper proposes a novel delegation constraint management model to manage and track delegation constraints across security domains. An algorithm to trace the authority of delegation constraints is introduced as well as an algorithm to form a delegation constraint set and detect/prevent potential conflicts. The algorithms and the management model are built upon a set of formal definitions of delegation constraints.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/39771/

Relação

http://eprints.qut.edu.au/39771/1/39771.pdf

Pham, Quan, Reid, Jason F., & Dawson, Edward (2011) A model for constraint and delegation management. In The 7th Information Security Practice and Experience Conference (ISPEC 2011), 30th May - 1st June 2011, Guangzhou, China.

Direitos

Copyright 2010 The authors.

Fonte

Faculty of Science and Technology; Information Security Institute

Palavras-Chave #080303 Computer System Security #Delegation #Constraint management #Access control #Distributed system
Tipo

Conference Paper