RT Journal Article
JF Policies for Distributed Systems and Networks, IEEE International Workshop on
YR 2009
VO 00
IS
SP 84
TI Delegation Assistance
A1 Andreas Schaad,
A1 Helmut Petritsch,
A1 Achim D. Brucker,
K1 delegation and revocation
K1 policy enforcement
K1 security services
K1 security architecture
AB Today's IT systems typically comprise a fine-grained access control mechanism based on complex policies. The strict enforcement of these policies, at runtime, always contains the risk of hindering people in their regular work. An efficient support for assisted delegation can help in resolving the conflict between too tight access control and the required flexibility as well as support the resolution of conflicts. Here, assisted delegation means that, additional to denying the access, a user is informed about a list of users that could either grant him access to the requested resource or which could execute this task in behalf of the user. In this paper, we present an approach for determining a set of users which are able to resolve an access control conflict. This set is based on various information sources and are ordered with respect to different distance functions. We show that one distance function can be used to serve different types of contextual input, e.g., role hierarchies, geospatial information as well as shared business object structure data or social network graphs.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN
LA English
DO 10.1109/POLICY.2009.35
LK http://doi.ieeecomputersociety.org/10.1109/POLICY.2009.35