Title :
Negotiated Access Control
Author :
Swaminathan, Kishore
Author_Institution :
Motorola Inc. and University of Massachusetts
Abstract :
List-oriented systems integrate protection of an object with the object; ticket oriented systems delegate this responsibiIity to the call hierarchy. We argue that there are situations where integration of protection with the object is more natural, but Iist-oriented systems, due to the static and declarative nature of access-Iists, are too weak for any sophisticated process-object interactions. To solve this, we superimpose procedural access control over the object - oriented capabiIity system model: objects may be associated with so-called access control procedures (ACP) that embody protection decisions. We define several protocols by which a process that wishes to access an object can negotiate with the ACP of the object to ensure that neither party´s protection requirements are violated in the interaction.
Keywords :
Access control; Databases; Kernel; Object recognition; Protocols; Routing;
Conference_Titel :
Security and Privacy, 1985 IEEE Symposium on
Conference_Location :
Oakland, CA, USA
Print_ISBN :
0-8186-0629-0
DOI :
10.1109/SP.1985.10019