System R: relational approach to database management
ACM Transactions on Database Systems (TODS)
An authorization mechanism for a relational database system
ACM Transactions on Database Systems (TODS)
Fault Tolerant Operating Systems
ACM Computing Surveys (CSUR)
Communications of the ACM
HYDRA: the kernel of a multiprocessor operating system
Communications of the ACM
Notes on Data Base Operating Systems
Operating Systems, An Advanced Course
Access control in a relational data base management system by query modification
ACM '74 Proceedings of the 1974 annual conference - Volume 1
System = program + users + law
ICAIL '87 Proceedings of the 1st international conference on Artificial intelligence and law
A procedure and tools for transition engineering
SDE 4 Proceedings of the fourth ACM SIGSOFT symposium on Software development environments
The Imposition of Protocols Over Open Distributed Systems
IEEE Transactions on Software Engineering
Law-governed software processes
ISPW '90 Proceedings of the 5th international software process workshop on Experience with software process models
Conflicts in Policy-Based Distributed Systems Management
IEEE Transactions on Software Engineering
Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems
ACM Transactions on Software Engineering and Methodology (TOSEM)
Provisions and Obligations in Policy Rule Management
Journal of Network and Systems Management
A transaction manager component for cooperative transaction models
CASCON '93 Proceedings of the 1993 conference of the Centre for Advanced Studies on Collaborative research: distributed computing - Volume 2
On the Challenge of Engineering Socio-technical Systems
Software-Intensive Systems and New Computing Paradigms
Toward practical authorization-dependent user obligation systems
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Conditional dependence networks in requirements engineering
COIN'09 Proceedings of the 5th international conference on Coordination, organizations, institutions, and norms in agent systems
A communication agreement framework for access/action control
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
On the management of user obligations
Proceedings of the 16th ACM symposium on Access control models and technologies
Ensuring authorization privileges for cascading user obligations
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Survey: Usage control in computer security: A survey
Computer Science Review
Obligations and their interaction with programs
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Hi-index | 0.00 |
Conventional authorization mechanisms provide actors with permissions to act, without the actor ever incurring any obligations as a result of executing the permitted action. There exist, however, many situations where system integrity requires that certain actions always be followed by others, within some reasonable time frame. We propose an extension to conventional authorization which allows the explicit association of obligations with permissions, and enforces them. We demonstrate that the extended mechanism can be used to support and enforce several general types of control policies and integrity constraints which are otherwise difficult or impossible to support.