Title : 
Negotiated Access Control
         
        
            Author : 
Swaminathan, Kishore
         
        
            Author_Institution : 
Motorola Inc. and University of Massachusetts
         
        
        
        
        
        
            Abstract : 
List-oriented systems integrate protection of an object with the object; ticket oriented systems delegate this responsibiIity to the call hierarchy. We argue that there are situations where integration of protection with the object is more natural, but Iist-oriented systems, due to the static and declarative nature of access-Iists, are too weak for any sophisticated process-object interactions. To solve this, we superimpose procedural access control over the object - oriented capabiIity system model: objects may be associated with so-called access control procedures (ACP) that embody protection decisions. We define several protocols by which a process that wishes to access an object can negotiate with the ACP of the object to ensure that neither party´s protection requirements are violated in the interaction.
         
        
            Keywords : 
Access control; Databases; Kernel; Object recognition; Protocols; Routing;
         
        
        
        
            Conference_Titel : 
Security and Privacy, 1985 IEEE Symposium on
         
        
            Conference_Location : 
Oakland, CA, USA
         
        
        
            Print_ISBN : 
0-8186-0629-0
         
        
        
            DOI : 
10.1109/SP.1985.10019