Proceedings of the 13th ACM Conference on Computer and Communications Security 2006
DOI: 10.1145/1180405.1180423
|View full text |Cite
|
Sign up to set email alerts
|

On the modeling and analysis of obligations

Abstract: Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the availability of services in many applications often further imposes obligation requirements, which specify what actions have to be taken by a subject in the future as a condition of getting certain privileges at present. However, it is not clear yet what the implications of obligation policies are concerning the security goals of a syst… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
79
0

Year Published

2006
2006
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 88 publications
(79 citation statements)
references
References 35 publications
0
79
0
Order By: Relevance
“…We also would like to extend our models to include user obligations [12], and use the idea of "charging for risk" to enforce those obligations. The risk charge is removed from the user's "risk account" if the user fulfils the obligation.…”
Section: Discussionmentioning
confidence: 99%
“…We also would like to extend our models to include user obligations [12], and use the idea of "charging for risk" to enforce those obligations. The risk charge is removed from the user's "risk account" if the user fulfils the obligation.…”
Section: Discussionmentioning
confidence: 99%
“…Traditional security policies largely focus on the specification and management of access control requirement [3], [9], however the availability of services in many applications often further requires obligation requirements (see for example in [5]). The questions of how to understand the interactions between access control policies and obligation polices, and how to integrate and compose policies to enforce consistency in a policy-based system, have not yet been adequately investigated.…”
Section: Introductionmentioning
confidence: 99%
“…Any concrete model instantiates one or more of its features. This metamodel was first presented in [9] and more detail can be found there.…”
Section: Metamodelmentioning
confidence: 99%
“…In [9], we propose a concept we call accountability as a more satisfactory obligation-security notion. Intuitively, if all users will have sufficient privileges and resource to carry out their obligations provided every other user diligently carries out his or her obligations (and no other actions are performed), then we say the system is in an accountable state.…”
Section: Accountabilitymentioning
confidence: 99%
See 1 more Smart Citation