Models for coalition-based access control (CBAC)

E Cohen, RK Thomas, W Winsborough… - Proceedings of the …, 2002 - dl.acm.org
E Cohen, RK Thomas, W Winsborough, D Shands
Proceedings of the seventh ACM symposium on Access control models and …, 2002dl.acm.org
To effectively participate in modern coalitions, member organizations must be able to share
specific data and functionality with coalition partners, while ensuring that their resources are
safe from inappropriate access. This requires access control models, policies, and
enforcement mechanisms for coalition resources. This paper describes a family of coalition-
based access control (CBAC) models, developed to provide a range of expressivity with an
accompanying range of implementation complexity. We define the protection state of a …
To effectively participate in modern coalitions, member organizations must be able to share specific data and functionality with coalition partners, while ensuring that their resources are safe from inappropriate access. This requires access control models, policies, and enforcement mechanisms for coalition resources. This paper describes a family of coalition-based access control (CBAC) models, developed to provide a range of expressivity with an accompanying range of implementation complexity. We define the protection state of a system, which provides the semantics of CBAC-based access policies. Finally, we briefly examine some of the issues for coalition access policy development and administration, and them complexity of implementing access enforcement mechanisms in a coalition environment.
ACM Digital Library