نتایج جستجو برای: authorization propagation

تعداد نتایج: 115609  

2007
Gansen Zhao David Chadwick Sassa Otenko

Role based access control has been widely used in security critical systems. Conventional role based access control is a passive model, which makes authorization decisions on requests, and the authorization decisions contain only information about whether the corresponding requests are authorised or not. One of the potential improvements for role based access control is the augmentation of obli...

Journal: :Journal of Computer Security 2007
Christian Skalka Xiaoyang Sean Wang Peter C. Chapin

Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all assertions as equally valid up to certificate authentication, realistic considerations may associate risk with some of these elements, for example some actors may be less trusted than others. Furthermore, practical online a...

Journal: :IACR Cryptology ePrint Archive 2014
Weijin Wang Yu Qin Dengguo Feng

We present the first automated proof of the authorization protocols in TPM 2.0 in the computational model. The Trusted Platform Module(TPM) is a chip that enables trust in computing platforms and achieves more security than software alone. The TPM interacts with a caller via a predefined set of commands. Many commands reference TPM-resident structures, and use of them may require authorization....

2015
Martín Abadi Mike Burrows Himabindu Pucha Adam Sadovsky Asim Shankar Ankur Taly

While groups are generally helpful for the definition of authorization policies, their use in distributed systems is not straightforward. This paper describes a design for authorization in distributed systems that treats groups as formal languages. The design supports forms of delegation and negative clauses in authorization policies. It also considers the wish for privacy and efficiency in gro...

2003
Shiguang Ju Zhen Yang Chang-da Wang Dianchun Guo

The characteristics of grid are outlined to point out that the traditional authorization mechanisms cannot satisfy the requirement of the grid security. Then the authorization mechanisms employed in five prevalent Grid Security Architectures are compared in terms of granularity assessment, flexibility of rights control, and achievement approach. Based on these, we propose several approaches tha...

2000
S. Farrell

AAA Authorization Requirements Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document specifies the requirements that Authentication Authorization Accounting (AAA) protocols must meet in order to support authorization services in the Internet. The requirem...

2007
Charles C. Zhang Marianne Winslett

When identity-based authorization becomes difficult due to the scalability requirements and highly dynamic nature of open distributed systems, digitally certifiable attributes can be an effective basis for specifying authorization policies. Before an authorization decision is made in such a system, a client needs to collect a set of credentials to prove that it satisfies the authorization polic...

2006
Manigandan Radhakrishnan Jon A. Solworth

An authorization system is at the core of the mechanisms that provide system security. It is responsible for allowing or denying user actions (like request to read or write a file, to connect to a website or kill a process). Despite considerable research in authorization systems, widely deployed authorization systems struggle to cope with today’s security needs. Some of the challenges facing to...

2007
Mohsen Rouached Claude Godart

The management and maintenance of a large number of Web services is not easy and, in particular, needs appropriate authorization policies to be defined so as to realize reliable and secure Web Services. The required authorization policies can be quite complex, resulting in unintended conflicts, which could result in information leaks or prevent access to information needed. This paper proposes ...

1996
Wolfgang Eßmayr Fritz Kastner Günther Pernul Stefan Preishuber A Min Tjoa

*) This work is supported by European ESPRIT III, project Nr. 8629. Abstract The paper describes authorization and access control in the IRO-DB database system, a system supporting interoperable access between relational and object-oriented databases. The security policy developed is a federated, administrative discretionary access control policy which supports positive, negative, as well as im...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید