Toward practical authorization-dependent user obligation systems

Murillo Pontual*, Omar Chowdhury, William H. Winsborough, Ting Yu, Keith Irwin

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Citations (Scopus)

Abstract

Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be usable, the system must ensure users have the authorizations they need when their obligations must be performed. Prior work in this area introduced accountability properties that ensure failure to fulfill obligations is not due to lack of required authorizations. That work presented inconclusive and purely theoretical results concerning the feasibility of maintaining accountability in practice. The results of the current paper include algorithms and performance analysis that support the thesis that maintaining accountability in a reference monitor is reasonable in many applications.

Original languageEnglish
Title of host publicationProceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010
Pages180-191
Number of pages12
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event5th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2010 - Beijing, China
Duration: 13 Apr 201016 Apr 2010

Publication series

NameProceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010

Conference

Conference5th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2010
Country/TerritoryChina
CityBeijing
Period13/04/1016/04/10

Keywords

  • RBAC
  • accountability
  • authorization systems
  • obligations
  • policy

Fingerprint

Dive into the research topics of 'Toward practical authorization-dependent user obligation systems'. Together they form a unique fingerprint.

Cite this