• DocumentCode
    525569
  • Title

    Dealing with delegation management in security policies

  • Author

    Abassi, Ryma ; El Fatmi, Sihem Guemara

  • Author_Institution
    Higher Sch. of Commun., Tunis, Tunisia
  • fYear
    2010
  • fDate
    March 30 2010-April 1 2010
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Because it governs all potential communication between entities, the need of security policies is nowadays increasingly growing and not to be any more proved. Moreover, in today´s technological society and to allow applications perpetuity, communication networks must support the collaboration between entities to face up any unavailability or flinching. On others hands, it must allow to a user without any administrative prerogatives to obtain the ability to grant some authorizations. That is what we call delegation. In this paper, we propose a delegation model as well as its keys activities management. The main contribution concerns revocation. In fact, we propose five dimensions allowing the definition of sixteen different revocation schemes.
  • Keywords
    authorisation; telecommunication network management; telecommunication security; communication networks; delegation management; revocation schemes; security policies; Access control; Authorization; Collaboration; Communication networks; Permission; Resilience; Security; affiliation; delegation; monotonicity; multiplicity; revocation; security policy;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Engineering Systems Management and Its Applications (ICESMA), 2010 Second International Conference on
  • Conference_Location
    Sharjah
  • Print_ISBN
    978-1-4244-6520-0
  • Electronic_ISBN
    978-9948-427-14-8
  • Type

    conf

  • Filename
    5542658