An Auto-Delegation Mechanism for Access Control Systems. / Crampton, J.; Morisset, C.

Proceedings of 6th International Workshop on Security and Trust Management. 2010.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Standard

An Auto-Delegation Mechanism for Access Control Systems. / Crampton, J.; Morisset, C.

Proceedings of 6th International Workshop on Security and Trust Management. 2010.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Crampton, J & Morisset, C 2010, An Auto-Delegation Mechanism for Access Control Systems. in Proceedings of 6th International Workshop on Security and Trust Management.

APA

Crampton, J., & Morisset, C. (2010). An Auto-Delegation Mechanism for Access Control Systems. In Proceedings of 6th International Workshop on Security and Trust Management

Vancouver

Crampton J, Morisset C. An Auto-Delegation Mechanism for Access Control Systems. In Proceedings of 6th International Workshop on Security and Trust Management. 2010

Author

Crampton, J. ; Morisset, C. / An Auto-Delegation Mechanism for Access Control Systems. Proceedings of 6th International Workshop on Security and Trust Management. 2010.

BibTeX

@inproceedings{c6d638e9512a4372b3b5abf3fb6c36d2,
title = "An Auto-Delegation Mechanism for Access Control Systems",
abstract = "Delegation is a widely used and widely studied mechanism in access control systems. Delegation enables an authorized entity to nominate another entity as its authorized proxy for the purposes of access control. Existing delegation mechanisms tend to rely on manual processes initiated by end-users. We believe that systems in which the set of available, authorized entities uctuates considerably and unpredictably over time require delegation mechanisms that can respond automatically to the absence of appropriately authorized users. To address this, we propose an auto-delegation mechanism and explore the way in which such a mechanism can be used to provide (i) controlled overriding of policy-based authorization decisions (ii) a novel type of access control mechanism based on subject-object relationships.",
author = "J. Crampton and C. Morisset",
note = "To appear",
year = "2010",
language = "English",
booktitle = "Proceedings of 6th International Workshop on Security and Trust Management",

}

RIS

TY - GEN

T1 - An Auto-Delegation Mechanism for Access Control Systems

AU - Crampton, J.

AU - Morisset, C.

N1 - To appear

PY - 2010

Y1 - 2010

N2 - Delegation is a widely used and widely studied mechanism in access control systems. Delegation enables an authorized entity to nominate another entity as its authorized proxy for the purposes of access control. Existing delegation mechanisms tend to rely on manual processes initiated by end-users. We believe that systems in which the set of available, authorized entities uctuates considerably and unpredictably over time require delegation mechanisms that can respond automatically to the absence of appropriately authorized users. To address this, we propose an auto-delegation mechanism and explore the way in which such a mechanism can be used to provide (i) controlled overriding of policy-based authorization decisions (ii) a novel type of access control mechanism based on subject-object relationships.

AB - Delegation is a widely used and widely studied mechanism in access control systems. Delegation enables an authorized entity to nominate another entity as its authorized proxy for the purposes of access control. Existing delegation mechanisms tend to rely on manual processes initiated by end-users. We believe that systems in which the set of available, authorized entities uctuates considerably and unpredictably over time require delegation mechanisms that can respond automatically to the absence of appropriately authorized users. To address this, we propose an auto-delegation mechanism and explore the way in which such a mechanism can be used to provide (i) controlled overriding of policy-based authorization decisions (ii) a novel type of access control mechanism based on subject-object relationships.

M3 - Conference contribution

BT - Proceedings of 6th International Workshop on Security and Trust Management

ER -