Changes between Version 1 and Version 2 of FeddAuthorizationArchitecture
- Timestamp:
- Oct 14, 2009 5:48:30 PM (15 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
FeddAuthorizationArchitecture
v1 v2 1 1 = Architecture = 2 2 3 Our model of authorization in the DFA is that principals are granted the right to perform operations on other principals bases on attributes of the principals. Possession of a given attribute by the requesting principal allows the requested operation to proceeed. The attribute required is set by the principal being operated on. 3 Our model of authorization in the DFA is that principals are granted the right to perform operations on other principals bases on attributes of the principals. Possession of a given attribute by the requesting principal allows the requested operation to proceeed. The attribute required is set by the principal being operated on. The notions of principals, attributes and negotiation comes from the [http://www.isso.sparta.com/research_projects/security_infrastructure/abac_overview.html ABAC system], which we use as an implemenation. 4 5 We reveiew the basic ABAC notions and operations and then discuss how that architecture is connected to the DFA. 4 6 5 7 == Principals ==