TY - GEN
T1 - Framework for role-based delegation models
AU - Barka, E.
AU - Sandhu, R.
N1 - Publisher Copyright:
© 2000 IEEE.
PY - 2000
Y1 - 2000
N2 - The basic idea behind delegation is that some active entity in a system delegates authority to another active entity to carry out some functions on behalf of the former. Delegation in computer systems can take many forms: human to human, human to machine, machine to machine, and perhaps even machine to human. We focuses on the human to human form of delegation using roles. As we show, there are many different ways in which role-based human-to-human delegation can occur. We develop a framework for identifying interesting cases that can be used for building role-based delegation models. This is accomplished by identifying the characteristics related to delegation, using these characteristics to generate possible delegation cases, and using a systematic approach to reduce the large number of cases into few useful cases which can be used to build delegation models.
AB - The basic idea behind delegation is that some active entity in a system delegates authority to another active entity to carry out some functions on behalf of the former. Delegation in computer systems can take many forms: human to human, human to machine, machine to machine, and perhaps even machine to human. We focuses on the human to human form of delegation using roles. As we show, there are many different ways in which role-based human-to-human delegation can occur. We develop a framework for identifying interesting cases that can be used for building role-based delegation models. This is accomplished by identifying the characteristics related to delegation, using these characteristics to generate possible delegation cases, and using a systematic approach to reduce the large number of cases into few useful cases which can be used to build delegation models.
KW - Access control
KW - Character generation
KW - Humans
KW - Information security
KW - Permission
KW - Qualifications
KW - Scanning probe microscopy
KW - Software engineering
UR - http://www.scopus.com/inward/record.url?scp=84892711302&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84892711302&partnerID=8YFLogxK
U2 - 10.1109/ACSAC.2000.898870
DO - 10.1109/ACSAC.2000.898870
M3 - Conference contribution
AN - SCOPUS:84892711302
T3 - Proceedings - Annual Computer Security Applications Conference, ACSAC
SP - 168
EP - 176
BT - Proceedings - 16th Annual Computer Security Applications Conference, ACSAC 2000
PB - IEEE Computer Society
T2 - 16th Annual Computer Security Applications Conference, ACSAC 2000
Y2 - 11 December 2000 through 15 December 2000
ER -