An Auto-Delegation Mechanism for Access Control Systems. / Crampton, J.; Morisset, C.
Proceedings of 6th International Workshop on Security and Trust Management. 2010.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
An Auto-Delegation Mechanism for Access Control Systems. / Crampton, J.; Morisset, C.
Proceedings of 6th International Workshop on Security and Trust Management. 2010.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
}
TY - GEN
T1 - An Auto-Delegation Mechanism for Access Control Systems
AU - Crampton, J.
AU - Morisset, C.
N1 - To appear
PY - 2010
Y1 - 2010
N2 - Delegation is a widely used and widely studied mechanism in access control systems. Delegation enables an authorized entity to nominate another entity as its authorized proxy for the purposes of access control. Existing delegation mechanisms tend to rely on manual processes initiated by end-users. We believe that systems in which the set of available, authorized entities uctuates considerably and unpredictably over time require delegation mechanisms that can respond automatically to the absence of appropriately authorized users. To address this, we propose an auto-delegation mechanism and explore the way in which such a mechanism can be used to provide (i) controlled overriding of policy-based authorization decisions (ii) a novel type of access control mechanism based on subject-object relationships.
AB - Delegation is a widely used and widely studied mechanism in access control systems. Delegation enables an authorized entity to nominate another entity as its authorized proxy for the purposes of access control. Existing delegation mechanisms tend to rely on manual processes initiated by end-users. We believe that systems in which the set of available, authorized entities uctuates considerably and unpredictably over time require delegation mechanisms that can respond automatically to the absence of appropriately authorized users. To address this, we propose an auto-delegation mechanism and explore the way in which such a mechanism can be used to provide (i) controlled overriding of policy-based authorization decisions (ii) a novel type of access control mechanism based on subject-object relationships.
M3 - Conference contribution
BT - Proceedings of 6th International Workshop on Security and Trust Management
ER -