Wang, Hua and Cao, Jinli (2008) Delegating revocations and authorizations. In: 5th International Conference on Business Process Management (BPM 2007) , 24-28 Sep 2007, Brisbane, Australia.
Delegation models based on role-based access control (RBAC) management have been known as flexible and efficient access management for data sharing on distributed environment. Delegation revocations are a significant functionality for the models in distributed environment when the delegated roles or permissions are required to get back. However, problems may arise in the revocation process when one user delegates user 'U' a role and another user delegates 'U' a negative authorization of the role.
This paper aims to analyse various role-based delegation revocation features through examples. Revocations are categorized in four dimensions: Dependency, Resilience, Propagation and Dominance. According the dimensions, sixteen types of revocations exist for specific requests in access management: DependentWeakLocalDelete, DependentWeakLocalNegative, DependentWeakGlobalDelete, DependentWeakGlobalNegative, IndependentWeakLocalDelete, IndependentWeakLocalNegative, IndependentWeakGlobalDelete, IndependentWeakGlobalNegative, and so on. We present revocation delegating models, and then discuss user delegation authorization and the impact of revocation operations. Finally, comparisons with other related work are indicated.
Statistics for this ePrint Item
|Item Type:||Conference or Workshop Item (Commonwealth Reporting Category E) (Paper)|
|Item Status:||Live Archive|
|Additional Information (displayed to public):||Deposited according to the copyright policy of the publisher. This is the authors' version of the work. It is posted here with permission of the publisher for your personal use. No further distribution is permitted. Series title: Lecture Notes in Computer Science, v. 4928|
|Depositing User:||Dr Hua Wang|
|Faculty / Department / School:||Historic - Faculty of Sciences - Department of Maths and Computing|
|Date Deposited:||19 Feb 2008 02:37|
|Last Modified:||12 Feb 2015 06:00|
|Uncontrolled Keywords:||delegation models; delegation revocations; authorization; RBAC|
|Fields of Research (FoR):||08 Information and Computing Sciences > 0806 Information Systems > 080604 Database Management
08 Information and Computing Sciences > 0803 Computer Software > 080303 Computer System Security
15 Commerce, Management, Tourism and Services > 1503 Business and Management > 150302 Business Information Systems
|Socio-Economic Objective (SEO):||E Expanding Knowledge > 97 Expanding Knowledge > 970108 Expanding Knowledge in the Information and Computing Sciences|
|Identification Number or DOI:||10.1007/978-3-540-78238-4_29|
Actions (login required)
|Archive Repository Staff Only|