Support for joint action based security policies

Vijay Varadharajan, Phillip Allen

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

2 Citations (Scopus)

Abstract

Authorization policy requirements in commercial applications are often richer compared to military applications in terms of the types of privileges required, and more complex in terms of both the nature and degree of interactions between participating objects. Delegation and joint action mechanisms allow a more flexible and dynamic form of access control, thereby enabling the representation of sophisticated authorization policies. This paper explores some issues that need to be addressed when designing joint actions based authorization policies, and their ramifications for trust of various components in the architecture. We consider an example from the medical field, and define attributes relevant to the design of joint action schemes and present three schemes for supporting joint action based authorization policies.

Original languageEnglish
Title of host publicationInformation Security and Privacy
Subtitle of host publicationFirst Australasian Conference, ACISP'96 Wollongong, NSW, Australia, June 24–26, 1996 Proceedings
EditorsJosef Pieprzyk, Jennifer Seberry
Place of PublicationBerlin; New York
PublisherSpringer, Springer Nature
Pages207-218
Number of pages12
ISBN (Electronic)9783540495833
ISBN (Print)3540619917, 9783540619918
DOIs
Publication statusPublished - Jun 1996
Externally publishedYes
Event1st Australasian Conference on Information Security and Privacy, ACISP - 1996 - Wollongong, Australia
Duration: 24 Jun 199626 Jun 1996

Publication series

NameLecture Notes in Computer Science
Volume1172
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other1st Australasian Conference on Information Security and Privacy, ACISP - 1996
CountryAustralia
CityWollongong
Period24/06/9626/06/96

Fingerprint Dive into the research topics of 'Support for joint action based security policies'. Together they form a unique fingerprint.

Cite this