Constrained Delegation

  • Authors:
  • Olav Bandmann;Babak Sadighi Firozabadi;Mads Dam

  • Affiliations:
  • -;-;-

  • Venue:
  • SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

Sometimes it is useful to be able to separate between the management of a set of resources, and the access to the resources themselves.Current accounts of delegation do not allow such distinctions to be easily made, however.We introduce a new model for delegation to address this issue. The approach is based on the idea of controlling the possible shapes of delegation chains.We use constraints to restrict the capabilities at each step of delegation.Constraints may re?ect e.g.group memberships, timing constraints, or dependencies on external data.Regular expressions are used to describe chained constraints.We present a number of example delegation structures, based on a scenario of collaborating organisations.