@inproceedings{f4de46c882414449b5f4e600e260f91f,
title = "Support for joint action based security policies",
abstract = "Authorization policy requirements in commercial applications are often richer compared to military applications in terms of the types of privileges required, and more complex in terms of both the nature and degree of interactions between participating objects. Delegation and joint action mechanisms allow a more flexible and dynamic form of access control, thereby enabling the representation of sophisticated authorization policies. This paper explores some issues that need to be addressed when designing joint actions based authorization policies, and their ramifications for trust of various components in the architecture. We consider an example from the medical field, and define attributes relevant to the design of joint action schemes and present three schemes for supporting joint action based authorization policies.",
author = "Vijay Varadharajan and Phillip Allen",
year = "1996",
month = jun,
doi = "10.1007/BFb0023300",
language = "English",
isbn = "3540619917",
series = "Lecture Notes in Computer Science",
publisher = "Springer, Springer Nature",
pages = "207--218",
editor = "Josef Pieprzyk and Jennifer Seberry",
booktitle = "Information Security and Privacy",
address = "United States",
note = "1st Australasian Conference on Information Security and Privacy, ACISP - 1996 ; Conference date: 24-06-1996 Through 26-06-1996",
}