Pol icy B ased Roles for D

نویسندگان

  • Emil Lupu
  • Morris Sloman
  • Nicholas Yialelis
چکیده

Distributed systems are increasingly being used in commercial environments necessitating the development of trustworthy and reliable security mechanisms. There is often no clear informal or formal specification of enterprise authorisation policies and no tools to translate policy specifications to access control implementation mechanisms such as capabilities or Access Control Lists. It is thus difficult to analyse the policy to detect conflicts or flaws and it is difficult to verify that the implementation corresponds to the policy specification. We present in this paper a framework for the specification of management policies. We are concerned with two types of policies: obligations which specify what activities a manager or agent must or must not perform on a set of target objects and authorisations which specify what activities a subject (manager or agent) can or can not perform on the set of target objects. Management policies are then grouped into roles reflecting the organisational structure. It is thus possible to assign or withdraw persons from the roles without changing their specification. Conflicts may arise in a set of policies which need then to be checked and analysed. We outline principles for conflict analysis and classification. Finally we present the implementation of the access control (authorisation) policies using security agents on a per-host basis to achieve a high degree of transparency to the application level.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Pol Icy B Ased Roles for D Istri Buted Syst Ems S Ecuri Ty

Distributed systems are increasingly being used in commercial environments necessitating the development of trustworthy and reliable security mechanisms. There is often no clear informal or formal specification of enterprise authorisation policies and no tools to translate policy specifications to access control implementation mechanisms such as capabilities or Access Control Lists. It is thus ...

متن کامل

Ence Pol Icy in Its so Cial Con Text

Pub lic sup port of sci ence is jus ti fied by three pri mary in stru men tal ra tio nales: sci en tific ad vance is nec es sary to cre ate new wealth; sci en tific ad vance is nec es sary to solve par tic u lar so ci etal prob lems; and sci en tific ad vance pro vides the in for ma tion nec es sary for mak ing ef fec tive de ci sions. Sig nif i cant and per sis tent dis par i ties be tween pro...

متن کامل

Deconstructing the “Rosenfeld Curve”

Since the ear ly 1970s, e lectr ic i ty consumption per capi ta in Cal ifornia has s tayed near ly constant , while r is ing s teadi ly for the United States as a whole. In the context of global energy policy making today, where both c l imate and energy secur i ty concerns p lay an increasingly large ro le , i t is important to understand the factors behind California’s success in s tabi l iz ...

متن کامل

A Dynamic Mobility Tracking Policy for Wireless Personal Communications Networks - Global Telecommunications Conference, 1995. GLOBECOM '95., IEEE

T h i s paper introduces a locat ion update pol icy which min imizes the cost of mobile t e rmina l ( M T ) location tracking. An M T dynamica l l y de t e rmines when t o per form locat ion update based o n i ts mobil i ty p a t t e r n a n d the incoming call arrival probability. T h e per formance of this s c h e m e is close to tha t of t he op t ima l pol icy reported earlier. However , t ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997