The paper addresses the issue of providing\ud access control via delegation and constraint management across multiple security domains. Specifically, this\ud paper proposes a novel Delegation Constraint Management model to manage and enforce delegation constraints\ud across security domains. An algorithm to trace the authority of delegation constraints is introduced as well\ud as an algorithm to form a delegation constraint set and\ud detect/prevent potential conflicts. The algorithms and\ud the management model are built upon a set of formal\ud definitions of delegation constraints. In addition, a constraint profile based on XACML is proposed as a means\ud to express the delegation constraint. The paper also includes a protocol to exchange...
International audienceIn the field of access control, delegation is an important aspect that is cons...
Abstract Delegation, from a technical point of view, is widely considered as a po-tential approach i...
Abstract This paper presents an infrastructure that enables the use of administrative delegation in ...
Abstract The paper addresses the issue of providing access control via delegation and constraint man...
Abstract. This paper introduces a model to facilitate delegation, in-cluding ad-hoc delegation, in c...
This paper introduces a model to facilitate delegation, including ad-hoc delegation, in cross securi...
Sometimes it is useful to be able to separate between the management of a set of resources, and the ...
In existing delegation models, delegation security entirely depends on delegators and security admin...
Delegation is a powerful mechanism to provide flexible and dynamic access control decisions. Delegat...
It is not uncommon for enterprises today to be faced with the demand to integrate and incor- porate ...
Delegation is a powerful mechanism to provide flexible and dynamic access control decisions. Delegat...
In access control and digital rights management, del-egation introduces the ability to decentralize ...
The characteristics of delegation are analyzed and defined in this paper, including time, totality, ...
Abstract. Delegation is a mechanism that allows a user A to act on another user B’s behalf by making...
Abstract. We describe adding support for dynamic delegation of authority between users in multiple a...
International audienceIn the field of access control, delegation is an important aspect that is cons...
Abstract Delegation, from a technical point of view, is widely considered as a po-tential approach i...
Abstract This paper presents an infrastructure that enables the use of administrative delegation in ...
Abstract The paper addresses the issue of providing access control via delegation and constraint man...
Abstract. This paper introduces a model to facilitate delegation, in-cluding ad-hoc delegation, in c...
This paper introduces a model to facilitate delegation, including ad-hoc delegation, in cross securi...
Sometimes it is useful to be able to separate between the management of a set of resources, and the ...
In existing delegation models, delegation security entirely depends on delegators and security admin...
Delegation is a powerful mechanism to provide flexible and dynamic access control decisions. Delegat...
It is not uncommon for enterprises today to be faced with the demand to integrate and incor- porate ...
Delegation is a powerful mechanism to provide flexible and dynamic access control decisions. Delegat...
In access control and digital rights management, del-egation introduces the ability to decentralize ...
The characteristics of delegation are analyzed and defined in this paper, including time, totality, ...
Abstract. Delegation is a mechanism that allows a user A to act on another user B’s behalf by making...
Abstract. We describe adding support for dynamic delegation of authority between users in multiple a...
International audienceIn the field of access control, delegation is an important aspect that is cons...
Abstract Delegation, from a technical point of view, is widely considered as a po-tential approach i...
Abstract This paper presents an infrastructure that enables the use of administrative delegation in ...