next up previous
Next: Related Work Up: Representation and Evaluation of Previous: Representation and Evaluation of

1.Introduction

The conventional concept of an Access Control List (ACL) has been the architectural foundation of many authorization mechanisms for some time. A typical ACL is associated with an object to be protected and enumerates the list of authorized users and their rights to access an object. Access rights are selected from a predefined fixed set built into the authorization mechanism. Specification of the subjects is bound to the particular security mechanism employed by the system. The limitations of the traditional access control model become apparent when it is applied in a heterogeneous, administratively decentralized, distributed system environment. The variety of services available on the Internet continues to increase and new classes of applications such as metacomputing, remote printing, and video conferencing are evolving. These applications will require interactions between entities across autonomous security domains. The generic traditional access rights may not be sufficient for some applications to express their authorization requirements. For example, a site might be willing to make its resources available to others limited to a maximum amount of CPU time and memory or based on a requirement of payment for the resources consumed. It is difficult to specify such security policies in terms of conventional ACLs. Specification of security policies for principals from multiple administrative domains poses additional problems: This paper describes an authorization framework designed to meet these needs. Our framework is applicable for a wide range of systems and applications. It includes a flexible mechanism for security policy representation and provides the integration of local and distributed security policies. The system supports the common authorization requirements and provides the means for defining and integrating application or organization specific policies as well. We show how this mechanism can implement role-based access control, Clark-Wilson model, and lattice-based policies.

Our framework consists of two components, a policy language and the Generic Authorization and Access-control API.


next up previous
Next: Related Work Up: Representation and Evaluation of Previous: Representation and Evaluation of
Tatyana Ryutov 2002-06-25