DocumentCode
525569
Title
Dealing with delegation management in security policies
Author
Abassi, Ryma ; El Fatmi, Sihem Guemara
Author_Institution
Higher Sch. of Commun., Tunis, Tunisia
fYear
2010
fDate
March 30 2010-April 1 2010
Firstpage
1
Lastpage
6
Abstract
Because it governs all potential communication between entities, the need of security policies is nowadays increasingly growing and not to be any more proved. Moreover, in today´s technological society and to allow applications perpetuity, communication networks must support the collaboration between entities to face up any unavailability or flinching. On others hands, it must allow to a user without any administrative prerogatives to obtain the ability to grant some authorizations. That is what we call delegation. In this paper, we propose a delegation model as well as its keys activities management. The main contribution concerns revocation. In fact, we propose five dimensions allowing the definition of sixteen different revocation schemes.
Keywords
authorisation; telecommunication network management; telecommunication security; communication networks; delegation management; revocation schemes; security policies; Access control; Authorization; Collaboration; Communication networks; Permission; Resilience; Security; affiliation; delegation; monotonicity; multiplicity; revocation; security policy;
fLanguage
English
Publisher
ieee
Conference_Titel
Engineering Systems Management and Its Applications (ICESMA), 2010 Second International Conference on
Conference_Location
Sharjah
Print_ISBN
978-1-4244-6520-0
Electronic_ISBN
978-9948-427-14-8
Type
conf
Filename
5542658
Link To Document