Modular authorization

  • Authors:
  • Horst F. Wedde;Mario Lischka

  • Affiliations:
  • Univ. of Dortmund, Dortmund, Germany;Univ. of Dortmund, Dortmund, Germany

  • Venue:
  • SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

There are three major drawbacks of a centralized security administration in distributed systems: It creates a bottleneck for request handling, it tends to enforce homogeneous security structures in heterogeneous user groups and organizations, and it is a weak point in terms of security attacks, reliability, and fault tolerance. In this paper we introduce a distributed authorization concept which is based on a modular authorization language for supporting cooperatingdistributed authorization teams. These teams are partially ordered into a hierarchy in that they inherit authorization rules from higher order teams but still exercise their autonomy by (dynamically) setting local rules that serve the special local needs in distributed organizations.Conflictsbetween between rules inherited from different higher ranking sources, orviolationsof higher order rules through local rules would be detected, on the logical level or through request evaluation, as contradictions or contradicting results, respectively. Conflict resolution mechanisms are presented, and examples are discussed extensively.