A method for access authorisation through delegation networks

  • Authors:
  • Audun Jøsang;Dieter Gollmann;Richard Au

  • Affiliations:
  • School of Software Engineering and Data Communications, QUT, Brisbane, Australia;Distributed Systems Security Group, Hamburg University of Technology, Germany;School of Software Engineering and Data Communications, QUT, Brisbane, Australia

  • Venue:
  • ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Owners of systems and resources usually want to control who can access them. This must be based on having a process for authorising certain parties, combined with mechanisms for enforcing that only authorised parties are actually able to access those systems and resources. In distributed systems, the authorisation process can include negative authorisation (e.g. black listing), and delegation of authorisation rights, which potentially can lead to conflicts. This paper describes a method for giving authorisations through a delegation network, and where each delegation and authorisation is expressed in the form of a belief measure. An entity's total authorisation for a given resource object and access type can be derived by analysing the delegation network using subjective logic. Access decisions are made by comparing the derived authorisation measure with required threshold levels, which makes authorisations non-categorical. By setting the threshold level higher than the assigned measure of a single authorisation, it is possible to require multiple authorisations for accessing specifc resources. The model is simple, intuitive and algebraic.