[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/829514.830538guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Constrained Delegation

Published: 12 May 2002 Publication History

Abstract

Sometimes it is useful to be able to separate between the management of a set of resources, and the access to the resources themselves.Current accounts of delegation do not allow such distinctions to be easily made, however.We introduce a new model for delegation to address this issue. The approach is based on the idea of controlling the possible shapes of delegation chains.We use constraints to restrict the capabilities at each step of delegation.Constraints may re?ect e.g.group memberships, timing constraints, or dependencies on external data.Regular expressions are used to describe chained constraints.We present a number of example delegation structures, based on a scenario of collaborating organisations.

Cited By

View all
  • (2012)Decentralized governance of distributed systems via interaction controlLogic Programs, Norms and Action10.5555/2340883.2340909(374-400)Online publication date: 1-Jan-2012
  • (2010)SecPAL: Design and semantics of a decentralized authorization languageJournal of Computer Security10.5555/1835408.183541118:4(619-665)Online publication date: 1-Dec-2010
  • (2009)A role-based XACML administration and delegation profile and its enforcement architectureProceedings of the 2009 ACM workshop on Secure web services10.1145/1655121.1655132(53-60)Online publication date: 13-Nov-2009
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
SP '02: Proceedings of the 2002 IEEE Symposium on Security and Privacy
May 2002
ISBN:0769515436

Publisher

IEEE Computer Society

United States

Publication History

Published: 12 May 2002

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2012)Decentralized governance of distributed systems via interaction controlLogic Programs, Norms and Action10.5555/2340883.2340909(374-400)Online publication date: 1-Jan-2012
  • (2010)SecPAL: Design and semantics of a decentralized authorization languageJournal of Computer Security10.5555/1835408.183541118:4(619-665)Online publication date: 1-Dec-2010
  • (2009)A role-based XACML administration and delegation profile and its enforcement architectureProceedings of the 2009 ACM workshop on Secure web services10.1145/1655121.1655132(53-60)Online publication date: 13-Nov-2009
  • (2009)A distributed requirements management framework for legal compliance and accountabilityComputers and Security10.1016/j.cose.2008.08.00128:1-2(8-17)Online publication date: 1-Feb-2009
  • (2007)Refinement for administrative policiesProceedings of the 4th VLDB conference on Secure data management10.5555/1780014.1780018(33-46)Online publication date: 23-Sep-2007
  • (2007)Extended privilege inheritance in RBACProceedings of the 2nd ACM symposium on Information, computer and communications security10.1145/1229285.1229335(383-385)Online publication date: 20-Mar-2007
  • (2006)A classification of delegation schemes for attribute authorityProceedings of the 4th international conference on Formal aspects in security and trust10.5555/1777688.1777699(158-169)Online publication date: 26-Aug-2006
  • (2006)Adding support to XACML for dynamic delegation of authority in multiple domainsProceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security10.1007/11909033_7(67-86)Online publication date: 19-Oct-2006
  • (2005)A delegation framework for federated identity managementProceedings of the 2005 workshop on Digital identity management10.1145/1102486.1102502(94-103)Online publication date: 11-Nov-2005
  • (2005)Efficient support for enterprise delegation policiesProceedings of the 2005 ACM symposium on Applied computing10.1145/1066677.1066757(340-345)Online publication date: 13-Mar-2005
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media