Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00
DOI: 10.1109/discex.2000.821518
|View full text |Cite
|
Sign up to set email alerts
|

Representation and evaluation of security policies for distributed system services

Abstract: We present a new model for authorization that

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0
1

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(21 citation statements)
references
References 13 publications
0
20
0
1
Order By: Relevance
“…In our example with long distance telephone carriers, account's phone number, encoded in the name of the resource in question, can be now used during policy evaluation. 1 Other examples of middleware security systems in which the enforcement function is implemented by an application system are Praesidium [22], Adage [23], GAA API [10,11,24] and Access Control Unit in [6]. As in RAD, these solutions feature an authorization function invoked by an application for obtaining access control decisions, which are expected to be enforced by an application.…”
Section: Adae With Targetmentioning
confidence: 99%
See 1 more Smart Citation
“…In our example with long distance telephone carriers, account's phone number, encoded in the name of the resource in question, can be now used during policy evaluation. 1 Other examples of middleware security systems in which the enforcement function is implemented by an application system are Praesidium [22], Adage [23], GAA API [10,11,24] and Access Control Unit in [6]. As in RAD, these solutions feature an authorization function invoked by an application for obtaining access control decisions, which are expected to be enforced by an application.…”
Section: Adae With Targetmentioning
confidence: 99%
“…Performing expensive re-incarnation of target objects for making security decisions also creates a vulnerability for denial of service attacks. Despite DF having a potential to be specific to the application domain, ADME schema allows enforcement of only those run-time pre-requisites, such as (dynamic) conditions in [10,11] and [6], obligations in XACML [12] and provisions in [13], that are non-specific to application domains (such as CPU load). This limitation is due to EF being part of the generic middleware layer.…”
Section: Mdme --Everything Is Done By Middlewarementioning
confidence: 99%
“…A variety of policy languages and models have been proposed. Some of them are generic [1,14,25,26,37] while others are designed for specific applications [7,11,36,38] or data models [8,9,19,29].…”
Section: Related Workmentioning
confidence: 99%
“…It also allows reusability of policies in different heterogeneous environments, especially inside different administrative domains. Due to these reasons and advantages, the policy paradigm is applied to build an A x service architecture, which leaves the policy representation [10] out of scope here.…”
Section: Policy Paradigmmentioning
confidence: 99%