Framework for role-based delegation models

E. Barka, R. Sandhu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

205 Citations (Scopus)


The basic idea behind delegation is that some active entity in a system delegates authority to another active entity to carry out some functions on behalf of the former. Delegation in computer systems can take many forms: human to human, human to machine, machine to machine, and perhaps even machine to human. We focuses on the human to human form of delegation using roles. As we show, there are many different ways in which role-based human-to-human delegation can occur. We develop a framework for identifying interesting cases that can be used for building role-based delegation models. This is accomplished by identifying the characteristics related to delegation, using these characteristics to generate possible delegation cases, and using a systematic approach to reduce the large number of cases into few useful cases which can be used to build delegation models.

Original languageEnglish
Title of host publicationProceedings - 16th Annual Computer Security Applications Conference, ACSAC 2000
PublisherIEEE Computer Society
Number of pages9
ISBN (Electronic)0769508596
Publication statusPublished - 2000
Externally publishedYes
Event16th Annual Computer Security Applications Conference, ACSAC 2000 - New Orleans, United States
Duration: Dec 11 2000Dec 15 2000

Publication series

NameProceedings - Annual Computer Security Applications Conference, ACSAC
ISSN (Print)1063-9527


Other16th Annual Computer Security Applications Conference, ACSAC 2000
Country/TerritoryUnited States
CityNew Orleans


  • Access control
  • Character generation
  • Humans
  • Information security
  • Permission
  • Qualifications
  • Scanning probe microscopy
  • Software engineering

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software
  • Safety, Risk, Reliability and Quality


Dive into the research topics of 'Framework for role-based delegation models'. Together they form a unique fingerprint.

Cite this