Joint actions based authorization schemes
- 1 July 1996
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGOPS Operating Systems Review
- Vol. 30 (3) , 32-45
- https://doi.org/10.1145/230908.230915
Abstract
Authorization policy requirements in commercial applications are often richer compared to military applications in terms of the types of privileges required, and more complex in terms of both the nature and degree of interactions between participating objects. Delegation and joint action mechanisms allow a more flexible and dynamic form of access control, thereby enabling the representation of sophisticated authorization policies. This paper explores some issues that need to be addressed when designing such joint actions based authorization policies. We describe some approaches to supporting joint actions based authorization policies, and their ramifications for trust of various components of the implementation. We consider an example from the medical field, and define attributes relevant to the design of joint action schemes and present three schemes for supporting joint action based authorization policies.Keywords
This publication has 3 references indexed in Scilit:
- An analysis of the proxy problem in distributed systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- An architecture for practical delegation in a distributed systemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- Department of Defense Trusted Computer System Evaluation CriteriaPublished by Springer Nature ,1985