Delegation Management Modeling in a Security Policy based Environment

Security Policies (SP) constitute the core of communication networks protection infrastructures. It offers a set of rules allowing differentiating between legitimate actions and prohibited ones and consequently, associates each entity in the network with a set of permissions and privileges. Moreover...

Full description

Bibliographic Details
Main Authors: Sihem Guemara El Fatmi, Ryma Abassi
Format: Article
Language:English
Published: Open Publishing Association 2013-07-01
Series:Electronic Proceedings in Theoretical Computer Science
Online Access:http://arxiv.org/pdf/1307.8322v1
_version_ 1828768967053803520
author Sihem Guemara El Fatmi
Ryma Abassi
author_facet Sihem Guemara El Fatmi
Ryma Abassi
author_sort Sihem Guemara El Fatmi
collection DOAJ
description Security Policies (SP) constitute the core of communication networks protection infrastructures. It offers a set of rules allowing differentiating between legitimate actions and prohibited ones and consequently, associates each entity in the network with a set of permissions and privileges. Moreover, in today's technological society and to allow applications perpetuity, communication networks must support the collaboration between entities to face up any unavailability or flinching. This collaboration must be governed by security mechanisms according to the established permissions and privileges. Delegation is a common practice that is used to simplify the sharing of responsibilities and privileges. The delegation process in a SP environment can be implanted through the use of adequate formalisms and modeling. The main contribution of this paper is then, the proposition of a generic and formal modeling of delegation process. This modeling is based on three steps composing the delegation life cycle: negotiation used for delegation initiation, verification of the SP respect while delegating and revocation of an established delegation. Hence, we propose to deal with each step according to the main delegation characteristics and extend them by some new specificities.
first_indexed 2024-12-11T13:39:23Z
format Article
id doaj.art-f35f28323052425291014f4bd027b6b6
institution Directory Open Access Journal
issn 2075-2180
language English
last_indexed 2024-12-11T13:39:23Z
publishDate 2013-07-01
publisher Open Publishing Association
record_format Article
series Electronic Proceedings in Theoretical Computer Science
spelling doaj.art-f35f28323052425291014f4bd027b6b62022-12-22T01:04:51ZengOpen Publishing AssociationElectronic Proceedings in Theoretical Computer Science2075-21802013-07-01122Proc. SCSS 2012859510.4204/EPTCS.122.8Delegation Management Modeling in a Security Policy based EnvironmentSihem Guemara El FatmiRyma AbassiSecurity Policies (SP) constitute the core of communication networks protection infrastructures. It offers a set of rules allowing differentiating between legitimate actions and prohibited ones and consequently, associates each entity in the network with a set of permissions and privileges. Moreover, in today's technological society and to allow applications perpetuity, communication networks must support the collaboration between entities to face up any unavailability or flinching. This collaboration must be governed by security mechanisms according to the established permissions and privileges. Delegation is a common practice that is used to simplify the sharing of responsibilities and privileges. The delegation process in a SP environment can be implanted through the use of adequate formalisms and modeling. The main contribution of this paper is then, the proposition of a generic and formal modeling of delegation process. This modeling is based on three steps composing the delegation life cycle: negotiation used for delegation initiation, verification of the SP respect while delegating and revocation of an established delegation. Hence, we propose to deal with each step according to the main delegation characteristics and extend them by some new specificities.http://arxiv.org/pdf/1307.8322v1
spellingShingle Sihem Guemara El Fatmi
Ryma Abassi
Delegation Management Modeling in a Security Policy based Environment
Electronic Proceedings in Theoretical Computer Science
title Delegation Management Modeling in a Security Policy based Environment
title_full Delegation Management Modeling in a Security Policy based Environment
title_fullStr Delegation Management Modeling in a Security Policy based Environment
title_full_unstemmed Delegation Management Modeling in a Security Policy based Environment
title_short Delegation Management Modeling in a Security Policy based Environment
title_sort delegation management modeling in a security policy based environment
url http://arxiv.org/pdf/1307.8322v1
work_keys_str_mv AT sihemguemaraelfatmi delegationmanagementmodelinginasecuritypolicybasedenvironment
AT rymaabassi delegationmanagementmodelinginasecuritypolicybasedenvironment