next up previous
Next: Policy Language Up: Representation and Evaluation of Previous: Related Work

Overview of the Framework

Our framework is applied to distributed systems that span multiple autonomous administrative domains without a central management authority. Applications may impose their own security policies and use different authentication services, e.g. Kerberos, DCE or X.509 certificates. We assume that within a distributed system, multiple independent applications coexist. The individual security requirements of each application are reflected in application-specific security policies. There might exist common ACLs that apply to sets of applications. Therefore, we wanted to design a flexible and expressive mechanism for representing and evaluating authorization policies. It had to be general enough to support a variety of security mechanisms based on public or secret key cryptosystems, and it had to be usable by multiple applications supporting different operations and even different kinds of protected objects. The major components of the architecture are:



Subsections
next up previous
Next: Policy Language Up: Representation and Evaluation of Previous: Related Work
Tatyana Ryutov 2002-06-25