A Flexible Authorization Framework

A Flexible Authorization Framework

Duminda Wijesekera (George Mason University, USA) and Sushil Jajodia (George Mason University, USA)
DOI: 10.4018/978-1-59140-186-5.ch004
OnDemand PDF Download:
$37.50

Abstract

Advances in application areas such as Internet-based transactions, cooperating coalitions, and workflow systems have brought new challenges to access control. In order to meet the diverse needs of emerging applications, it has become necessary to support multiple access control policies in one security domain. This chapter describes an authorization framework, referred to as the Flexible Authorization Framework (FAF), which is capable of doing so. FAF is a logic-based framework in which authorizations are specified in terms of a locally stratified rule base. FAF allows permissions and prohibitions to be included in its specification. FAF specifications can be changed by deleting and inserting its rules. We also describe FAF’s latest additions, such as revoking granted permissions, provisional authorizations, and obligations.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Acknowledgments
Maria Grazia Fugini, Carlo Bellettini
Chapter 1
Guido Bertoni, Jorge Guajardo, Christof Paar
In the last 20-30 years, the world of modern cryptography has been largely dominated by traditional systems such as the Data Encryption Standard and... Sample PDF
Architectures for Advanced Cryptographic Systems
$37.50
Chapter 2
Diana Berbecaru, Corrado Derenale, Antonio Lioy
The technical solutions and organizational procedures used to manage certificates are collectively named Public Key Infrastructure (PKI). The... Sample PDF
Digital Certificates and Public-Key Infrastructures
$37.50
Chapter 3
Gerald Maradan, Pierre Cotte, Thierry Fornas
Securing data is becoming of the utmost strategic importance in today’s digital environment. Open wide networks such as the Internet and... Sample PDF
Smart Card Applications and Systems: Market Trend and Impact on Other Technological Development
$37.50
Chapter 4
Duminda Wijesekera, Sushil Jajodia
Advances in application areas such as Internet-based transactions, cooperating coalitions, and workflow systems have brought new challenges to... Sample PDF
A Flexible Authorization Framework
$37.50
Chapter 5
Abdelmounaam Rezgui, Athman Rouguettaya, Zaki Malik
Over the past few years there has been a huge influx of web accessible information. Information access and storage methods have grown considerably.... Sample PDF
Enforcing Privacy on the Semantic Web
$37.50
Chapter 6
Secure Data Dissemination  (pages 198-229)
Elisa Berino, Barbara Carminati, Elena Ferrari
In this chapter, we present the main security issues related to the selective dissemination of information (SDI system). More precisely, after... Sample PDF
Secure Data Dissemination
$37.50
Chapter 7
Eduardo Fernandez-Medina, Sabrina De Capitani di Vimercati, Ernesto Damiani, Mario Piattini, Pierangela Samarati
Multimedia content delivery applications are becoming widespread thanks to increasingly cheaper access to high bandwidth networks. Also, the... Sample PDF
Multimedia Security and Digital Rights Management Technology
$37.50
Chapter 8
Ping Lin, K. Selçuk Candan
The cost of creating and maintaining software and hardware infrastructures for delivering web services led to a notable trend toward the use of... Sample PDF
Data and Application Secutiry for Distributed Application Hosting Services
$37.50
Chapter 9
Eduardo B. Fernandez, Michael Thomsen, Minjie H. Fernandez
Platforms for web services have been reduced to two basic approaches: Microsoft .NET and Sun ONE (J2EE). We compare here these two platforms with... Sample PDF
Comparing the Security Architectures of Sun ONE and Microsoft .NET
$37.50
About the Authors