{"title":"约束支持的可控授权委托模型","authors":"Dongxian Shi, Changle Wang","doi":"10.1109/CYBERC.2009.5342170","DOIUrl":null,"url":null,"abstract":"Trust management is a common approach on access control in the distributed environment. RT is one of the frameworks for role-based trust management. However, RT has some faults, and one of the main faults is the delegation control. To address this problem, this paper proposes a controllable authorization delegation model supported by constraint. First, the framework of RT and a reasonable classification of the RT attributes are introduced. Second, to better control the spread of permission, the constraint on the authorization source is implemented and the formalization of constraints is described. Finally, a usage of the model is illustrated through a typical example.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Controllable authorization delegation model supported by constraints\",\"authors\":\"Dongxian Shi, Changle Wang\",\"doi\":\"10.1109/CYBERC.2009.5342170\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Trust management is a common approach on access control in the distributed environment. RT is one of the frameworks for role-based trust management. However, RT has some faults, and one of the main faults is the delegation control. To address this problem, this paper proposes a controllable authorization delegation model supported by constraint. First, the framework of RT and a reasonable classification of the RT attributes are introduced. Second, to better control the spread of permission, the constraint on the authorization source is implemented and the formalization of constraints is described. Finally, a usage of the model is illustrated through a typical example.\",\"PeriodicalId\":222874,\"journal\":{\"name\":\"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CYBERC.2009.5342170\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CYBERC.2009.5342170","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Controllable authorization delegation model supported by constraints
Trust management is a common approach on access control in the distributed environment. RT is one of the frameworks for role-based trust management. However, RT has some faults, and one of the main faults is the delegation control. To address this problem, this paper proposes a controllable authorization delegation model supported by constraint. First, the framework of RT and a reasonable classification of the RT attributes are introduced. Second, to better control the spread of permission, the constraint on the authorization source is implemented and the formalization of constraints is described. Finally, a usage of the model is illustrated through a typical example.