Title :
Non-monotonic transformation of access rights
Author :
Sandhu, Ravi S. ; Suri, Gurpreet S.
Author_Institution :
Dept. of Inf. & Software Syst. Eng., Goerge Mason Univ., Fairfax, VA, USA
Abstract :
It is known that monotonic transformations unify a number of diverse access control mechanisms such as amplification, copy flags, separation of duties, and synergistic authorization. The importance and expressive power of nonmonotonic transformations is demonstrated. A formal model, called nonmonotonic transform (NMT), is defined. A distributed implementation of NMT is proposed using a client-server architecture. The implementation is remarkably simple and modular in concept. It is based on access control lists and allows for efficient and immediate revocation which could be partial, complete, selective, temporary, or permanent
Keywords :
access control; authorisation; distributed processing; access control mechanisms; amplification; client-server architecture; copy flags; distributed processing; nonmonotonic transformations; separation of duties; synergistic authorization; Access control; Authorization; Information systems; Monitoring; Permission; Power system modeling; Safety; Security; Software systems; Systems engineering and theory;
Conference_Titel :
Research in Security and Privacy, 1992. Proceedings., 1992 IEEE Computer Society Symposium on
Conference_Location :
Oakland, CA
Print_ISBN :
0-8186-2825-1
DOI :
10.1109/RISP.1992.213264