DocumentCode :
525569
Title :
Dealing with delegation management in security policies
Author :
Abassi, Ryma ; El Fatmi, Sihem Guemara
Author_Institution :
Higher Sch. of Commun., Tunis, Tunisia
fYear :
2010
fDate :
March 30 2010-April 1 2010
Firstpage :
1
Lastpage :
6
Abstract :
Because it governs all potential communication between entities, the need of security policies is nowadays increasingly growing and not to be any more proved. Moreover, in today´s technological society and to allow applications perpetuity, communication networks must support the collaboration between entities to face up any unavailability or flinching. On others hands, it must allow to a user without any administrative prerogatives to obtain the ability to grant some authorizations. That is what we call delegation. In this paper, we propose a delegation model as well as its keys activities management. The main contribution concerns revocation. In fact, we propose five dimensions allowing the definition of sixteen different revocation schemes.
Keywords :
authorisation; telecommunication network management; telecommunication security; communication networks; delegation management; revocation schemes; security policies; Access control; Authorization; Collaboration; Communication networks; Permission; Resilience; Security; affiliation; delegation; monotonicity; multiplicity; revocation; security policy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Engineering Systems Management and Its Applications (ICESMA), 2010 Second International Conference on
Conference_Location :
Sharjah
Print_ISBN :
978-1-4244-6520-0
Electronic_ISBN :
978-9948-427-14-8
Type :
conf
Filename :
5542658
Link To Document :
بازگشت