نتایج جستجو برای: delegation
تعداد نتایج: 3322 فیلتر نتایج به سال:
belief in the lofty positions and excellences of the shi’īte imams (a.s.) and having faith in their miraculous acts and dominion over the world affairs underlies the authentic doctrine of unconditional guardianship (wilāya al-takwīnī). when the imams’ devotees try to maintain a demigod status for the imams in line with this – possibly loving and devotional – belief beyond the conventional limit...
We present in this paper a basic scheme for delegation in a federated setting and two more advanced schemes, transferable and corporate delegation. By transferable delegation delegatees are able to delegate the received privileged actions further to someone else. Corporate delegation is delegation within a business context. Our schemes are generic and user-centric. We elaborate on the different...
The paper addresses the issue of providing access control via delegation and constraint management across multiple security domains. Specifically, this paper proposes a novel Delegation Constraint Management model to manage and enforce delegation constraints across security domains. An algorithm to trace the authority of delegation constraints is introduced as well as an algorithm to form a del...
Grid delegation is the procedure by which a valid user endows another user or a program or service with the ability to act on that user’s behalf. Delegation is the primary form of authorization in grids. The large and geographically distributed, dynamic, heterogeneous and scalable grid environment poses unique delegation requirements. Presently there are no standard mechanisms to guide grid del...
Attribute-Based Access Control (ABAC) is an emerging model of access control that has gained significant interest in both recent academic literature and industry application. However, to date there have been almost no attempts to incorporate the concept of dynamic delegation into ABAC. This work lays out a number of possible strategies for incorporating delegation into existing ABAC models and ...
Chinese Wall Security Policy (CWSP) is a widely applied access control policy in many fields, especially in commercial world. Delegation is one of the hot topics of access control technologies. Delegation with CWSP means delegation must satisfy not only delegation constrains but CWSP as well. There exist many delegation models, such as RBDM, RDM2000 and PBDM et al, but few focus on it. This pap...
As information systems became widely used by organizations and enterprises, resource sharing and collaboration of work have been pervasive. As a natural way to realize this, delegation has become the routine rather than the exception. However, traditional delegation models have encountered various issues in meeting the growing and diverse requirements. Some of them fail to provide sufficient de...
The paper extends the optimal delegation framework pioneered by Holmström (1977, 1984) to a dynamic environment where, at the outset, the agent privately knows his ability to interpret decision relevant private information received later on. We show that any mechanism can be implemented by a sequential menu of delegation sets where the agent first picks a delegation set and then chooses an acti...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید