Delegating revocations and authorizations
Paper
Paper/Presentation Title | Delegating revocations and authorizations |
---|---|
Presentation Type | Paper |
Authors | Wang, Hua (Author) and Cao, Jinli (Author) |
Editors | ter Hofstede, A., Benatallah, B. and Paik, H. Y. |
Journal or Proceedings Title | Lecture Notes in Computer Science (Book series) |
Journal Citation | 4928, pp. 294-305 |
Number of Pages | 12 |
Year | 2008 |
Publisher | Springer |
Place of Publication | Germany |
ISSN | 1611-3349 |
0302-9743 | |
ISBN | 9783540782377 |
Digital Object Identifier (DOI) | https://doi.org/10.1007/978-3-540-78238-4_29 |
Web Address (URL) of Paper | https://link.springer.com/chapter/10.1007/978-3-540-78238-4_29 |
Web Address (URL) of Conference Proceedings | https://link.springer.com/book/10.1007/978-3-540-78238-4 |
Conference/Event | 5th International Conference on Business Process Management (BPM 2007) |
Event Details | Rank A |
Event Details | 5th International Conference on Business Process Management (BPM 2007) Event Date 24 to end of 28 Sep 2007 Event Location Brisbane, Australia |
Abstract | Delegation models based on role-based access control (RBAC) management have been known as flexible and efficient access management for data sharing on distributed environment. Delegation revocations are a significant functionality for the models in distributed environment when the delegated roles or permissions are required to get back. However, problems may arise in the revocation process when one user delegates user 'U' a role and another user delegates 'U' a negative authorization of the role. This paper aims to analyse various role-based delegation revocation features through examples. Revocations are categorized in four dimensions: Dependency, Resilience, Propagation and Dominance. According the dimensions, sixteen types of revocations exist for specific requests in access management: DependentWeakLocalDelete, DependentWeakLocalNegative, DependentWeakGlobalDelete, DependentWeakGlobalNegative, IndependentWeakLocalDelete, IndependentWeakLocalNegative, IndependentWeakGlobalDelete, IndependentWeakGlobalNegative, and so on. We present revocation delegating models, and then discuss user delegation authorization and the impact of revocation operations. Finally, comparisons with other related work are indicated. |
Keywords | delegation models; delegation revocations; authorization; RBAC |
ANZSRC Field of Research 2020 | 460599. Data management and data science not elsewhere classified |
460499. Cybersecurity and privacy not elsewhere classified | |
350303. Business information systems | |
Public Notes | Files associated with this item cannot be displayed due to copyright restrictions. |
Byline Affiliations | Centre for Systems Biology |
La Trobe University |
https://research.usq.edu.au/item/9y970/delegating-revocations-and-authorizations
1972
total views1064
total downloads1
views this month0
downloads this month