A rule-based framework for role-based delegation and revocation
- 1 August 2003
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Information and System Security
- Vol. 6 (3) , 404-441
- https://doi.org/10.1145/937527.937530
Abstract
Delegation is the process whereby an active entity in a distributed environment authorizes another entity to access resources. In today's distributed systems, a user often needs to act on another user's behalf with some subset of his/her rights. Most systems have attempted to resolve such delegation requirements with ad-hoc mechanisms by compromising existing disorganized policies or simply attaching additional components to their applications. Still, there is a strong need in the large, distributed systems for a mechanism that provides effective privilege delegation and revocation management. This paper describes a rule-based framework for role-based delegation and revocation. The basic idea behind a role-based delegation is that users themselves may delegate role authorities to others to carry out some functions authorized to the former. We present a role-based delegation model called RDM2000 (role-based delegation model 2000) supporting hierarchical roles and multistep delegation. Different approaches for delegation and revocation are explored. A rule-based language for specifying and enforcing policies on RDM2000 is proposed. We describe a proof-of-concept prototype implementation of RDM2000 to demonstrate the feasibility of the proposed framework and provide secure protocols for managing delegations. The prototype is a web-based application for law enforcement agencies allowing reliable delegation and revocation. The future directions are also discussed.Keywords
This publication has 11 references indexed in Scilit:
- Role-based authorization constraints specificationACM Transactions on Information and System Security, 2000
- SPKI Certificate TheoryPublished by RFC Editor ,1999
- The ARBAC97 model for role-based administration of rolesACM Transactions on Information and System Security, 1999
- A role-based access control model and reference implementation within a corporate intranetACM Transactions on Information and System Security, 1999
- Distributed Access-Rights Management with Delegation CertificatesPublished by Springer Nature ,1999
- The Role of Trust Management in Distributed Systems SecurityPublished by Springer Nature ,1999
- Access control for large collectionsACM Transactions on Information Systems, 1997
- A calculus for access control in distributed systemsACM Transactions on Programming Languages and Systems, 1993
- Authentication in distributed systemsACM Transactions on Computer Systems, 1992
- A rule-based language with functions and setsACM Transactions on Database Systems, 1991