Changes between Version 1 and Version 2 of FeddAuthorizationArchitecture


Ignore:
Timestamp:
Oct 14, 2009 5:48:30 PM (15 years ago)
Author:
faber
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • FeddAuthorizationArchitecture

    v1 v2  
    11= Architecture =
    22
    3 Our model of authorization in the DFA is that principals are granted the right to perform operations on other principals bases on attributes of the principals.  Possession of a given attribute by the requesting principal allows the requested operation to proceeed.  The attribute required is set by the principal being operated on.
     3Our model of authorization in the DFA is that principals are granted the right to perform operations on other principals bases on attributes of the principals.  Possession of a given attribute by the requesting principal allows the requested operation to proceeed.  The attribute required is set by the principal being operated on.  The notions of principals, attributes and negotiation comes from the [http://www.isso.sparta.com/research_projects/security_infrastructure/abac_overview.html ABAC system], which we use as an implemenation.
     4
     5We reveiew the basic ABAC notions and operations and then discuss how that architecture is connected to the DFA.
    46
    57== Principals ==