Delegating revocations and authorizations

  • Authors:
  • Hua Wang;Jinli Cao

  • Affiliations:
  • Centre for Systems Biology, Department of Maths & Computing, University of Southern Queensland, Toowoomba, QLD, Australia;Department of Computer Science & Computer Engineering, La Trobe University, Melbourne, VIC, Australia

  • Venue:
  • BPM'07 Proceedings of the 2007 international conference on Business process management
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Delegation models based on role-based access control (RBAC) management have been known as flexible and efficient access management for data sharing on distributed environment. Delegation revocations are a significant functionality for the models in distributed environment when the delegated roles or permissions are required to get back. However, problems may arise in the revocation process when one user delegates user U a role and another user delegates U a negative authorization of the role. This paper aims to analyse various role-based delegation revocation features through examples. Revocations are categorized in four dimensions: Dependency, Resilience, Propagation and Dominance. According the dimensions, sixteen types of revocations exist for specific requests in access management: DependentWeakLocalDelete, DependentWeakLocalNegative, DependentWeakGlobalDelete, DependentWeakGlobalNegative, IndependentWeakLocalDelete, IndependentWeakLocalNegative, IndependentWeakGlobalDelete, IndependentWeakGlobalNegative, and so on. We present revocation delegating models, and then discuss user delegation authorization and the impact of revocation operations. Finally, comparisons with other related work are indicated.