A rule-based framework for role-based constrained delegation
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Efficient support for enterprise delegation policies
Proceedings of the 2005 ACM symposium on Applied computing
A delegation framework for federated identity management
Proceedings of the 2005 workshop on Digital identity management
Extended privilege inheritance in RBAC
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Policy Administration Control and Delegation Using XACML and Delegent
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
A role-based XACML administration and delegation profile and its enforcement architecture
Proceedings of the 2009 ACM workshop on Secure web services
A classification of delegation schemes for attribute authority
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
Refinement for administrative policies
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
SecPAL: Design and semantics of a decentralized authorization language
Journal of Computer Security - Digital Identity Management (DIM 2007)
Proceedings of the 11th international conference on Security Protocols
Towards a mechanism for discretionary overriding of access control
SP'04 Proceedings of the 12th international conference on Security Protocols
An authorization framework based on constrained delegation
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Towards more controllable and practical delegation
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Discretionary capability confinement
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
An XML standards based authorization framework for mobile agents
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Adding support to XACML for dynamic delegation of authority in multiple domains
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Decentralized governance of distributed systems via interaction control
Logic Programs, Norms and Action
Hi-index | 0.00 |
Sometimes it is useful to be able to separate between the management of a set of resources, and the access to the resources themselves.Current accounts of delegation do not allow such distinctions to be easily made, however.We introduce a new model for delegation to address this issue. The approach is based on the idea of controlling the possible shapes of delegation chains.We use constraints to restrict the capabilities at each step of delegation.Constraints may re?ect e.g.group memberships, timing constraints, or dependencies on external data.Regular expressions are used to describe chained constraints.We present a number of example delegation structures, based on a scenario of collaborating organisations.