Change search
ReferencesLink to record
Permanent link

Direct link
Constrained delegation
Number of Authors: 3
2002 (English)Conference paper (Refereed)
Abstract [en]

Sometimes it is useful to be able to separate between the management of a set of resources, and the access to the resources themselves. Current accounts of delegation do not allow such distinctions to be easily made, however. We introduce a new model for delegation to address this issue. The approach is based on the idea of controlling the possible shapes of delegation chains. We use constraints to restrict the capabilities at each step of delegation. Constraints may reflect e.g. group memberships, timing constraints, or dependencies on external data. Regular expressions are used to describe chained constraints. We present a number of example delegation structures, based on a scenario of collaborating organisations.

Place, publisher, year, edition, pages
2002, 1. , 12 p.
National Category
Computer and Information Science
URN: urn:nbn:se:ri:diva-22505OAI: diva2:1042070
Proceedings of IEEE Symposium on Security and Privacy
Available from: 2016-10-31 Created: 2016-10-31

Open Access in DiVA

fulltext(123 kB)13 downloads
File information
File name FULLTEXT01.pdfFile size 123 kBChecksum SHA-512
Type fulltextMimetype application/pdf
fulltext(161 kB)1 downloads
File information
File name FULLTEXT02.psFile size 161 kBChecksum SHA-512
Type fulltextMimetype application/postscript

Computer and Information Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 14 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 7 hits
ReferencesLink to record
Permanent link

Direct link