A model for constraint and delegation management

  • Authors:
  • Quan Pham;Jason Reid;Ed Dawson

  • Affiliations:
  • Information Security Institute, Queensland University of Technology, Brisbane, QLD, Australia;Information Security Institute, Queensland University of Technology, Brisbane, QLD, Australia;Information Security Institute, Queensland University of Technology, Brisbane, QLD, Australia

  • Venue:
  • ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper introduces a model to facilitate delegation, including ad-hoc delegation, in cross security domain activities. Specifically, this paper proposes a novel delegation constraint management model to manage and track delegation constraints across security domains. A procedure to trace the authority of delegation constraints is introduced as well as a procedure to form a delegation constraint set and detect/prevent potential conflicts.