[cap-talk] Reactive risk driven security using transactional
context-sensitive full digraph authorization.
toby.murray at dsto.defence.gov.au
Thu Oct 6 20:56:44 EDT 2005
I've read the whitepaper and I think I understand where you are coming
from with all this; however, I'm having trouble imagining an example of
where such a system would be applicable. For me, it needs an example to
motivate (what I see as) the complexity inherent in the design.
Also, I'm not sure how it is to be applied. Is each node in a chain
supposed to make an authorisation decision based on the security state
etc. or is it that some (global) external entity makes the authorisation
decision? If it is an external entity, then how can multiple security
policies be supported? Presumably we're talking about distributed
systems here. If a system is complex enough to require chains of access
etc. as is the basic assumption here (from what I can tell), then
presumably it is also being used by multiple parties, each with their
own interests and agendas. How can interests of multiple entiites be
easily supported by a monolothic, global security policy? (Or am I
Rob J Meijer wrote:
>I've been working on a small whitepaper focusing on the fundamentals of
>reactive risk driven authorization systems.
>As I had some trouble comunicating the full design of the authorization
>system I am working on, I've take the time to try and focus first on the
>underlying fundamentals of this design first in this a short whitepaper.
>This as the complete design apeared to be somewhat confusing and unclear.
>If anyone of you guys would be able to give me some feedback on this short
>whitepaper, that would be very welcome.I'm prety confident now that I've
>gor my fundamental
>issues sorted out to a large extend, but just to make sure that I did not
>again overlook important issues, I would very much like input on this
>Rob J Meijer
>cap-talk mailing list
>cap-talk at mail.eros-os.org
Advanced Computer Capabilities Unit
Information Networks Division
IMPORTANT: This e-mail remains the property of the Australian Defence
Organisation and is subject to the jurisdiction of section 70 of the
Crimes Act 1914. If you have received this e-mail in error, you are
requested to contact the sender and delete the e-mail.
More information about the cap-talk