Abstract | ||
---|---|---|
Sometimes it is useful to be able to separate between the management of a set of resources, and the access to the resources themselves.Current accounts of delegation do not allow such distinctions to be easily made, however.We introduce a new model for delegation to address this issue. The approach is based on the idea of controlling the possible shapes of delegation chains.We use constraints to restrict the capabilities at each step of delegation.Constraints may re?ect e.g.group memberships, timing constraints, or dependencies on external data.Regular expressions are used to describe chained constraints.We present a number of example delegation structures, based on a scenario of collaborating organisations. |
Year | Venue | Keywords |
---|---|---|
2002 | IEEE Symposium on Security and Privacy | Constrained Delegation,possible shape,delegation chain,new model,example delegation structure,current account,group membership,timing constraint,external data,regular expression,chained constraint |
DocType | ISBN | Citations |
Conference | 0-7695-1543-6 | 26 |
PageRank | References | Authors |
3.83 | 4 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Olav Bandmann | 1 | 26 | 3.83 |
Babak Sadighi Firozabadi | 2 | 123 | 17.12 |
Mads Dam | 3 | 754 | 61.86 |