Meta-policies for distributed role-based access control systems

被引:16
作者
Belokosztolszki, A [1 ]
Moody, K [1 ]
机构
[1] Univ Cambridge, Comp Lab, Cambridge, England
来源
THIRD INTERNATION WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS | 2002年
关键词
D O I
10.1109/POLICY.2002.1011298
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper meta-policies for access control policies are presented. There has been a lot of research into the various ways of specifying policy for a single domain. Such domains are autonomous and can be managed by the users or by a specific system administrator It is often helpful to have a more general policy description in order to restrict the ways in which policy can be modified. Meta-policies fill this particular role. With their help changes to policy can be made subject to predefined constraints. Meta-policies are long lived and so can provide users with stable information about the policy of the system. In addition they can provide bodies external to a domain with relevant but restricted information about its policies, so forming a basis for co-operation between domains. For example, a domain's meta-policy can function as a policy interface, thus establishing a basis for agreement on the structure of the objects accessed. In this way it is possible to build service level agreements between domains automatically.
引用
收藏
页码:106 / 115
页数:10
相关论文
共 21 条
[11]   Conflicts in policy-based distributed systems management [J].
Lupu, EC ;
Sloman, M .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1999, 25 (06) :852-869
[12]  
MOFFETT JD, 1994, SPECIFICATION MANAGE, P455
[13]  
NYANCHAMA M, 1999, ROLE GRAPH MODEL CON
[14]  
Sandhu R., 1998, P 3 ACM WORKSH ROL B, P47, DOI DOI 10.1145/286884.286893
[15]  
Sandhu R., 1997, P 2 ACM WORKSH ROL B, P41, DOI [10.1145/266741.266752, DOI 10.1145/266741.266752]
[16]  
Sandhu R., 2000, P 5 ACM WORKSH ROL B, P111, DOI DOI 10.1145/344287.344309
[17]  
Sandhu R., 2000, Symposium on Access Control Models and Technologies: Proceedings of the fifth ACM workshop on Role-based access control, V26, P47
[18]   Role based access control models [J].
Sandhu, RS ;
Coyne, EJ ;
Feinstein, HL ;
Youman, CE .
COMPUTER, 1996, 29 (02) :38-&
[19]   ACCESS-CONTROL - PRINCIPLES AND PRACTICE [J].
SANDHU, RS ;
SAMARATI, P .
IEEE COMMUNICATIONS MAGAZINE, 1994, 32 (09) :40-48
[20]  
SIMON RT, 1997, PCSFW