2013
DOI: 10.4204/eptcs.122.8
|View full text |Cite
|
Sign up to set email alerts
|

Delegation Management Modeling in a Security Policy based Environment

Abstract: Security Policies (SP) constitute the core of communication networks protection infrastructures. It offers a set of rules allowing differentiating between legitimate actions and prohibited ones and consequently, associates each entity in the network with a set of permissions and privileges. Moreover, in today's technological society and to allow applications perpetuity, communication networks must support the collaboration between entities to face up any unavailability or flinching. This collaboration must be … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(14 citation statements)
references
References 9 publications
0
14
0
Order By: Relevance
“…• condition [1]:When to optionally specify conditions for the authorization rules. -Subject is the metaclass that is used to specify the role with granted access.…”
Section: Fig 2 Authorization Policy Metamodelmentioning
confidence: 99%
See 4 more Smart Citations
“…• condition [1]:When to optionally specify conditions for the authorization rules. -Subject is the metaclass that is used to specify the role with granted access.…”
Section: Fig 2 Authorization Policy Metamodelmentioning
confidence: 99%
“…• allowedAction [1]:Action, to specify the category of actions which the subject has access to; • domain [1]:Target, to specify the domain which the subject has access to; formed. This metaclass is linked to:…”
Section: Fig 2 Authorization Policy Metamodelmentioning
confidence: 99%
See 3 more Smart Citations