<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Context-Aware Identity Delegation</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Naveed Ahmed</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Christian D. Jensen</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Informatics and Mathematical Modelling Technical University of Denmark DK</institution>
          <addr-line>-2800 Lyngby</addr-line>
          <country country="DK">Denmark</country>
        </aff>
      </contrib-group>
      <fpage>3</fpage>
      <lpage>15</lpage>
      <abstract>
        <p>In emerging ubiquitous computing, related nomadic users often perform similar tasks and share the same computing infrastructure. This means that security of the shared resources is of prime importance. Frequent delegation of tasks among users must be anticipated as most nomadic environments are hectic and very dynamic. A delegation mechanism with a slightly complicated user interface will not only reduce the productivity but also provide nomadic users with a strong motivation to circumvent the mechanism itself. Delegation in access control domain is not practical for the most of nomadic users due to its complicated and complex structure. Identity delegation at authentication level provides improved usability, which reduces the risk of circumventing the delegation mechanism; at the same time, however, identity delegation violates the principle of least privileges. We use contextual information of a delegatee to mitigate this violation, which helps to achieve a higher level of practical security in nomadic environments.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>The pervasive use of computing technology in our life has caused a shift in how
we interact with computers. Earlier, in the age of mainframes and desktops, a
user had to physically move to a computer to access information or computing
resources. When technology allowed manufacturing of lightweight devices along
with a well connected wireless communication infrastructure, the paradigm of
mobile computing emerged. This allows people to move freely in an environment
along with their computing devices, so information and (modest) computing
resources are ubiquitously available. More recently, we have started embedding
computing devices into work environments, which makes the nomadic use of
computing possible. Nomadic users move freely in their work environment and
use shared devices that are embedded in the environment on which they can
invoke their unique sessions. A typical example is a hospital, where computers and
equipment are shared among doctors and nurses. These people access patients'
health-care data from di erent terminals in wards using their unique identities.</p>
      <p>
        In collaborative work environments, nomadic users often need to work in each
other's place, for instance, in the nomadic environment of hospitals, a senior
doctor may need to delegate his duties to another doctor when a patient in a
critical condition arrives in the emergency unit. In this case, the senior doctor
is primarily concerned with two things: to whom should he delegate and which
of the patients and wards need to be taken care of. In the hectic environment of
current hospitals, doctors generally prefer to simply share their passwords and
sessions for the delegation [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], rather than doing so by a complicated procedure
that may o er a higher level of security. For these nomadic users, it does not
make sense to engage them beyond their simple concerns of Whom and Which
for the purpose of delegation; otherwise, they would tend to circumvent the
delegation mechanism due to its usability issues.
      </p>
      <p>
        From a user's perspective, delegation is only concerned with the two simple
questions: to whom one should delegate, the delegatee; and in which context
the delegatee should be authorized to work on one's behalf. From a security
perspective, however, it is also accompanied with ne level details of individual
authorizations, in order to follow the principle of least privileges [
        <xref ref-type="bibr" rid="ref15 ref3">3, 15</xref>
        ]. A pure
security perspective represents one extreme, where a delegation mechanism has
ne granularity and thus each privilege is transferred individually, however, this
ne control also makes it cumbersome and error prone. Considering the usability
perspective, delegation becomes more and more coarse grained, where many
privileges are transferred simultaneously, at the expense of the principle of least
privileges, but its simplicity could make it more user-friendly and thus more
likely to be used in practice.
      </p>
      <p>Delegation is necessarily regulated by a security policy, which de nes the
privileges of each user and their authority to delegate them. We call this the
Designed Security Level. The designed security level is not an actual
assessment of the security of the system, but captures the intentions of the designers
through their speci cation of policies and choice of mechanisms. However, the
security that we achieve in practice is often less than or at most equal to the
designed level, we call this the E ective Security Level because security mechanisms
may contain vulnerabilities and users may decide to circumvent the mechanism,
e.g., by sharing passwords. Most systems are designed to achieve a speci c level
of security, which is perhaps mandated by legislation, so the designed security
level tends to remain constant over time. The e ective security level, however,
tends to degrade with time as vulnerabilities are discovered { but not
necessarily patched, advances in technology makes new attacks possible, new techniques
in cryptanalysis are discovered or simply that the vigilance of users erode and
shared passwords proliferate in the system. This increasing security gap between
the designed and e ective security levels is illustrated in Figure 1.</p>
      <p>It is important to note, however, that the curve shown in the gure is for
illustrative purposes and exact shape of the curve is not relevant; the actual
shape depends on the type of the system, the con guration and operation of the
system, and parameters of the computational environment in which the system
is deployed. For example, new security mechanisms, for which the users are not
yet trained or aware of its purpose, the curve of e ective security could have the
positive slopes in the start. In any case, the poor usability in delegation provides
a motivation to users for deceiving the access control mechanism by sharing their
authentication tokens, which also contributes to the widening security gap.</p>
      <p>
        The security gap could be reduced by improving the usability of
delegation. The identity delegation at authentication level has a considerable usability
advantage over classic delegation models, but on the expense of violating the
principle of least privileges [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Still, the identity delegation could provide more
e ective security than classic delegation mechanisms for many nomadic
environments where there are pre-established trust relationships among users, such as in
a group of doctors who work together in a hospital. We extend the identity
delegation [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] to include contextual information, which further increase the usability
while at the same time provides more justi cations to use the identity
delegation despite of its obvious violation of the principle of least privileges. The use of
context limits the unnecessary spread of authorizations. We have implemented
the proposed mechanism in form of a prototype.
      </p>
      <p>In the next section, we describe part of the state of the art in delegation.
Section 3 presents our delegation mechanism in detail. In Section 4, we describe
the details of the prototype. Section 5 provides evaluation of the mechanism. In
the nal section, we present some conclusions.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related Work</title>
      <p>
        The term delegation has many de nitions, for instance Abadi et al. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], Barka
and Sandhu [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], Gasser and McDermott [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], Gladney [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], etc. In the following,
we adhere to the de nition of Zhang et al. [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], i.e., we consider authentication
as a process in which one active entity in a system transfers its authority to
another active entity in order for that entity to carry out a job on behalf of
the rst entity. In this paper, we only focus on human-to-human delegation and
consider a delegator who delegates his authorizations, while one who receives
these authorizations is referred as a delegatee. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]
      </p>
      <p>
        Human-to-human delegation can be at access control level or at
authentication level. At the access control level, Gasser and McDermott [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] propose
a delegation technique with cryptographic assurances of the revocation if the
system is subsequently compromised. Varadharajan et al. [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] consider
delegation in distributed systems as the problem of veri cation for a delegatee using
signature-based scheme with certain assumptions of trust relationships among
the system entities. Zhang et al. [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] propose a rule-based speci cation language
and a rule-based framework for the role-based multi-step delegation. The
delegation at permission level, although with very limited options, can also be
accomplished in the UNIX access control model. A formal framework for delegation
under Role Based Access Control(RBAC) is proposed by Barka [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Bertino et
al. [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] presents the notion of context in form of Temporal- RBAC that supports
periodic role enabling and the notion of time in form of temporal dependencies
among permissions. Covington et al. [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] extends the context of model beyond
time by incorporating constraints of location and system status. Kumar et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]
presents a formal context-sensitive RBAC model, which enables complex security
policies using the context information.
      </p>
      <p>
        At user's authentication level, an identity delegation essentially assigns the
system identi er of a delegator to a delegatee. A framework at this level is
invented by Mercredi and Frey [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], whose primary objective is to enable a
person to sign in on the behalf of another person. Ahmed and Jensen [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] propose
a simpler architecture of identity delegation, which is derived from the usability
factors of delegation in nomadic environments. Using sudo or su commands of
UNIX are implementation dependent alternatives.
      </p>
      <p>
        An identity delegation transfers all authorizations of a user most of which
might not be required for the delegated job. Nevertheless, an identity delegation
can be more user friendly as all the necessary privileges are delegated in one fell
swoop along with the identity, while at access control level, it is usually hard for
a user to gure out the exact privileges necessary for performing a particular job.
Li and Wang [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] address this problem in access control domain, by bundling
the authorizations of a job in form of a unit. On the other hand, revocation of
delegation is equally important and might be non-trivial [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
      <p>
        In nomadic use of computing, where users frequently delegate to one
another, complexity of delegation (and its revocation) results in poor usability and
provides a strong incentive for users to bypass the secure way of delegation. As
indicated by Bardram, et al. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], users start sharing their authentication tokens
for mutual collaboration. On the other hand, the existing user-friendly identity
delegation techniques [
        <xref ref-type="bibr" rid="ref14 ref2">14, 2</xref>
        ] do not consider the context and thus cause a wider
spread of authorities, which restricts their use to a limited number of nomadic
environments.
      </p>
    </sec>
    <sec id="sec-3">
      <title>The Mechanism for Context-Aware Identity Delegation</title>
      <p>In the following discussion, the term Validated identity refers to the identity that
an authentication mechanism concludes with help of one or more authentication
techniques. Similarly, the so-called authenticated identity provided to an access
control mechanism is referred as E ective identity.</p>
      <p>Figure 2 exempli es the two approaches for delegation: the delegation in
access control domain; and the delegation in authentication domain. In the former
case, a validated identity and the corresponding e ective identity are assumed
to be the same and therefore delegation is managed in the access control domain
in terms of permissions and roles; as shown, a delegatee A is recognized as A
in the access control domain and has the authorizations of A as well as of B.
Delegation in authentication domain is achieved by distinguishing the notions
of validated identity and e ective identity. As shown in the lower part of the
gure, a delegatee A, who is authenticated as A, may assume the e ective
identity of either A or B. This allows A to use the authorizations of either A or B,
depending on the choice of e ective identity.</p>
      <p>
        In this paper, we extend the basic de nition of identity delegation [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] to
include context information. \A context-aware identity delegation at
authentication level is a process in which an authentication mechanism provides an
e ective identity that is di erent from the validated identity of a user provided
the following conditions are true."
1. Whom: The owner of the e ective identity (delegator) has previously
delegated his identity to owner of the validated identity (delegatee).
2. Which: The current context of authentication for the delegatee is same as
previously speci ed by the delegator.
      </p>
      <p>From the delegator's perspective these two conditions are two simple
decisions: whom to delegate; under which context to delegate. In this paper we
only consider time of day and the network address of a computer as the context
information, but the de nition of context is not limited to these two factors.</p>
      <p>The architecture of proposed mechanism is shown in Figure 3. In our
architecture, Authentication module is augmented by the three other modules and
is shown as Authentication and Delegation(AD) part in Figure 3. These three
modules are Delegation Con guration, Delegation Controller and Context
Monitor. The Delegation Con guration module contains the delegation policies that
are currently active in the system. In the prototype, Delegation Con guration
consists of a database, which contains Whom and Which speci cations of the
all delegations in a system. The Context Monitor captures and distributes the
context information of a delegatee; in our case, it supplies the current time and
the network address of the computer on which the delegatee is validated by
an Authentication module. The Delegation Controller performs the translation
from a validated identity to an e ective identity depending on the delegation
policy and input from the Context Monitor; it also records all delegation events
in a local log le.</p>
      <p>When a delegatee approaches a system, the claimed identity of the delegatee
is validated by a classic authentication mechanism, in the usual way. After this,
the module Delegation Controller maps the validated identity to an e ective user
identity based on the input from Delegation Con guration. Now, this e ective
identity is supplied to the access control mechanism. As de ned earlier, this
e ective identity could either be of the delegatee or of the delegator, depending
on the inputs from Delegation Con guration and Context Monitor. The gure
shows that a user A can be recognized as a user B in the access control mechanism
if B has previously delegated his identity to A and the current context of the
system for A is same as previously speci ed by B.</p>
      <p>The con guration in Delegation Con guration can be considered as the
delegation policy of a system and is in the form of mappings between validated
identity and e ective identity. Each mapping relation is associated with some
context constraints under which the relation holds. Additionally there is also a
list of preferences for each system user that speci es the currently active identity
among multiple available identities. Thus, depending on the mapping, context
and the preferences a particular identity is provided to the access control
mechanism.</p>
      <p>We provide a simple user interface in the user's session to specify the
delegation policy for new delegations and for changing existing policies. We refer to
it as Delegation User Interface in the gure. This interface should only require
from a user to decide to whom and under which context to delegate, so that the
user does not worry about speci c permissions, roles, security policy or security
administrator.</p>
      <p>
        The log le provides a level of accountability in the system. Since our
mechanism is at authentication level, we cannot restrict unnecessary delegated
authorizations as they are part of the access control domain. This drawback is
inherited from the very nature of identity delegation and is justi ed by the log
le and the assumption of mutual trust among co-workers and colleagues [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
In our mechanism we restrict the propagation of unnecessary authorizations by
limiting the delegation in particular context speci ed by the delegator. In this
way we increase the security of a system by limiting the violation of the principle
of least privileges.
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>The Prototype</title>
      <p>
        The prototype consists of a personal computer running Debian Linux and is the
extended version of our original prototype for identity delegation [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. We have
augmented the classic login based authentication mechanism with RFID based
authentication. In the idle state when no user is present on the system, multiple
sessions of users are suspended and the computer display is locked. When a user
approaches, the relevant session is invoked instantly if RFID badge is validated.
This invoked session could be the session of the user or it can be a delegated
session. This selection depends on the preference in the delegation con
guration, which can easily be changed by a simple command. The interaction of the
di erent modules in the prototype is shown in Figure 4. We have not shown
Delegation Con guration and Log le. Context Monitor, which in our case consists
of the system timer and the network address, is also not shown. RFID
Authentication module grants or denies an authentication request using the identi cation
which it receives from the RFID reader. Delegation Controller is launched with
the privileges of \root" at start-up, just before GNOME display manager(GDM)
is started. In the GNOME based desktop, a single GDM manages the sessions
(X-Servers) of all users. The Delegation Controller in the prototype interacts
with GDM, by sending commands in a customized format through Clients that
run in each of the user's sessions. GDM provides an abstraction for multiple
sessions and also invokes the password based login program (GDMlogin). However,
GDMlogin program is only a front end for interacting with a user, the actual
authentication is achieved by a pluggable authentication module associated with
GDM. We use network sockets for the interprocess communication, in order to
simplify its porting on distributed nomadic networks.
      </p>
      <p>In typical use, a user carrying a valid RFID tag enters into the interrogation
eld of an RFID reader. The RFID reader reports the identi cation to the RFID
Authentication module, which checks this identi cation in the local database to
nd a match for a system user. If a match is found, the Delegation Controller
maps the matched identi cation (validated identity) to a new identi cation
(effective identity) based on the status of the delegation con guration and the
current context. As shown in the gure, the context in our case is limited to a
pseudo location imm.322.11 and the time of day. After deciding the e ective
identity, Delegation Controller activates the corresponding session.</p>
      <p>For the delegation purpose, we have developed a console program in user's
space, which represents the user interface for delegation. For example, if a user
Bob wants to delegate his session to a user Alice, for the o ce hours on a
computer in Room 11 of Building 322, he issues the following simple command.
Now, if Alice is in the right context, i.e. Room 11 of Building 322 between 8 am
and 4 pm, then she can invoke B's session in one of the following way. Firstly, if
she does not have her local account on the machine then the B's session can be
invoked automatically when she walks up to the terminal. Secondly, if her local
account exists on the machine and she has previously speci ed her preference for
B's session on the machine then again the session can be invoked automatically.
Lastly, if her local account exists but she has not previously used B'session then
she need to issue following simple command from the terminal.</p>
      <p>&gt;dlg switch Bob
&gt;dlg reset Alice
And nally when Bob want to revoke the delegation, he uses the following
command.</p>
      <p>Besides this basic example, there are many more user-friendly commands for
di erent aspects of delegation. The use of location and time in the example is only
one possible form of context and in principle, other parameters can be included,
though we have not implemented them in the prototype. All the commands of
delegation in the prototype share a common motive, which is the simplicity of
user interface as we aim to make the delegation process to be more user friendly
so that nomadic users actually use it rather than to circumvent it. The syntax
of the delegation program is as follow.</p>
      <p>Syntax::= dlg &lt;action&gt; &lt;parameters&gt;
&lt;action&gt;::= set | reset | switch | reset-rec |</p>
      <p>get | reset-all | NULL
set:&lt;parameters&gt;::= &lt;user_login_name&gt; &lt;context&gt;</p>
      <p>&lt;context&gt;::= @&lt;location&gt; [&lt;time_period&gt;]
reset:&lt;parameter&gt;::= &lt;user_login_name&gt;
reset-rec:&lt;parameters&gt;::= NULL</p>
      <p>get:&lt;parameters&gt; ::= NULL
reset-all:&lt;parameters&gt; ::= NULL</p>
      <p>Invoking dlg without any argument shows help for the command. Otherwise,
set is for setting an outbound delegation, reset is for revoking an existing
outbound delegation, switch is to switch among delegated sessions, reset-rec is to
revoke all inbound delegated sessions, get is for getting information from existing
delegation policy, reset-all is for resetting all outbound delegations in one go.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Comparison and a Formal Model</title>
      <p>
        Similar to any delegation mechanism developed in the authentication domain,
our mechanism violates the principle of least privileges [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], but we believe that
this is justi ed in nomadic environments, where there are pre-established trust
relationships among users [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The use of context limits the proliferation of
unnecessary authorizations, which makes our mechanism more secure than a simple
identity delegation at authentication level.
      </p>
      <p>If the delegation is ne grained, then there is always a risk of under-delegation,
which e ectively results in a denial of service; this is very undesirable in most
cases. Similarly, revocation becomes non-trivial in some ne grained delegation
mechanisms designed at access control level. In our mechanism, delegation and
revocation are just a matter of issuing a simple command.</p>
      <p>The classic access control models of UNIX and Unix-like systems may achieve
delegation by changing le permissions and group memberships, but this also
implies that one should be either the owner of the resource or must have super
user privileges; A user is not necessarily able to delegate all privileges which he
is authorized to use. In our mechanism this problem is removed and delegation
is a user level decision.</p>
      <p>
        In order to compare our mechanism with classic delegation techniques we use
a formal logic [
        <xref ref-type="bibr" rid="ref1 ref12 ref18">18, 1, 12</xref>
        ]. We start by introducing a few notions from this logic.
When we write A says S, it implies that the entity A utters the statement S
and believes in its truthfulness. We write A ) B to represent a kind of trust
relationship in a way that whenever A makes a statement, B makes it too. Since
the statement, made by a particular entity of the system, implies that the
entity believes in it, thus the statement A ) B represents the trust of B on A.
We write A as R to represent the entity A in a particular role R and
consequently A as R has a subset of all authorizations that A normally possesses.
For instance, A0token represents the role of A that possesses the correct
authentication token of A. Similarly, A0context represents a particular context of
A. We write (A j B) says S to represent that A is quoting a statement, S, of B.
We write (A for B) says S to represent a quoted statement S and in addition,
A is authorized to make such quoted statements on the behalf of B.
      </p>
      <p>Each entity has a set of authorizations, which it can transfer or delegate to
other entities in the system using following axioms.</p>
      <p>If A says (B ) A) then (B ) A) for the system . . . (1)
(This axiom represents the transfer of authorities from A to B.)</p>
      <p>If A says ((B j A) ) (B for A))
then ((B j A) ) (B for A)) for the system . . . (2)
(This axiom is the classic identity delegation in access control domain as the
identity of A is retained)</p>
      <p>Now, let us consider Figure 3 and divide it in three system level entities: the
user, A; the authentication and the delegation primitives enclosed in the
rectangle of the gure, AD; and the access control mechanism, AC. We also assume
that the only role of the authentication module AD is to provide the identity of
a user. The default trust relationships between these entities are represented by
the following statements.</p>
      <p>AD ) AC . . . (3)
(The access control mechanism trusts the authentication mechanism and thus
the access control mechanism believes in the identity provided by the
authentication mechanism.)</p>
      <p>A as A0token ) AD . . . (4a)
and B as B0token ) AD . . . (4b)
(The authentication mechanism trusts a user with the role of possessing the
correct authentication credentials in the form of a valid token that corresponds to
the user in the authentication database. )</p>
      <p>The statements (3) and (4) are enough to complete the trust chain from a
user to the access control mechanism in order to invoke a user's session. For
example a user A with A'token can invoke A'session. In our context aware identity
delegation mechanism, a user A may delegate his identity to another user B by
sending a request to the authentication mechanism in the following form.</p>
      <p>(A as A0token) says
(((B as B0token)and(B as B0Context))j(A as A0token))
) A as A0token) . . . (5)
(An authenticated user A tells the authentication mechanism that if the
authenticated user B, in a `Context', quotes a statement of the authenticated user A
then it must be considered as the actual statement from the authenticated user
A. The user A speci es Context, in the form of environmental constraints, such
as time, location, etc. )</p>
      <p>Due to the formal logic axioms, the e ect of the statement (5) is the
following new trust relationship, which is in fact the context-aware identity delegation.</p>
      <p>The statement (6) represents that if a user B, in a speci c context, requests
for the session of user A, then this request is considered to be equivalent to the
request directly made by the user A, which was in form of the statement (4a).
Note that the identity delegation represented by (6) is di erent from the transfer
of authorities in (1) and the classic delegation of (2). In (1) the identity of the
delegator A is completely lost and in (2) the identity of delegator is present in
all requests made by the delegatee. In our mechanism of (6) the identity of the
delegator A is only present in the authentication and thus the access control
mechanism does not distinguish between a delegator and a delegatee.
6</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusions</title>
      <p>In nomadic environments, the usability of delegation is a decisive parameter in
determining the e ective level of system security. People in such environments
mostly delegate to their co-workers and colleagues in whom they trust. This
fact along with use of context and the logging of delegation events can be used
to justify the security of our mechanism in nomadic environments. Since we
provide a user friendly interface for delegation, thus many more people will use
this secure way of delegation rather than attempt to deceive the access control
mechanism for delegating their authorities, which helps to improve the e ective
level of security.</p>
      <p>
        Despite the obvious security improvement, however, we have not conducted
an evaluation to determine exact quantitative values and therefore our claims
are only justi ed by intuitive arguments of the paper; nevertheless, nding good
metrics for the accurate measure of security is an open eld of research [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Mart</surname>
            n Abadi, Michael Burrows, Butler Lampson, and
            <given-names>Gordon</given-names>
          </string-name>
          <string-name>
            <surname>Plotkin</surname>
          </string-name>
          .
          <article-title>A calculus for access control in distributed systems</article-title>
          .
          <source>ACM Transactions on Programming Languages and Systems (TOPLAS)</source>
          ,
          <volume>15</volume>
          (
          <issue>4</issue>
          ):
          <volume>706</volume>
          {
          <fpage>734</fpage>
          ,
          <year>September 1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Naveed</given-names>
            <surname>Ahmed</surname>
          </string-name>
          and
          <string-name>
            <given-names>Christian D.</given-names>
            <surname>Jensen</surname>
          </string-name>
          .
          <article-title>A mechanism for identity delegation at authentication level</article-title>
          .
          <source>In The 14th Nordic Conference in Secure IT Systems</source>
          , NordSec-2009, Oslo, Norway,
          <year>October 2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Mehran</given-names>
            <surname>Ahsant</surname>
          </string-name>
          .
          <article-title>On-demand Restricted Delegation: A Framework for Dynamic, Context-Aware, Least-Privilege Delegation in Grids</article-title>
          .
          <source>PhD thesis</source>
          , Kungliga Tekniska Hogskolan,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4. Girish Cha e Arun Kumar,
          <string-name>
            <given-names>Neeran</given-names>
            <surname>Karnik</surname>
          </string-name>
          .
          <article-title>Context sensitivity in role-based access contro</article-title>
          .
          <source>ACM SIGOPS Operating Systems Review</source>
          ,
          <volume>36</volume>
          (
          <issue>3</issue>
          ):
          <volume>53</volume>
          {
          <fpage>66</fpage>
          ,
          <year>July 2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>Jakob</given-names>
            <surname>Bardram</surname>
          </string-name>
          , Thomas K., and
          <string-name>
            <given-names>Christina</given-names>
            <surname>Nielsen</surname>
          </string-name>
          .
          <article-title>Mobility in health care - reporting on our initial observations and pilot study</article-title>
          .
          <source>Technical Report CfPC 2003-PB-52</source>
          , Center for Pervasive Computing,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Ezedin</surname>
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Barka</surname>
          </string-name>
          .
          <article-title>Framework for Role-Based Delegation Models</article-title>
          .
          <source>PhD thesis</source>
          , George Mason University,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Elisa</given-names>
            <surname>Bertino</surname>
          </string-name>
          , Piero Andrea Bonatti, and
          <string-name>
            <given-names>Elena</given-names>
            <surname>Ferrari</surname>
          </string-name>
          .
          <article-title>Trbac: A temporal rolebased access control model</article-title>
          .
          <source>ACM Transactions on Information and System Security (TISSEC)</source>
          ,
          <volume>4</volume>
          (
          <issue>3</issue>
          ):
          <volume>191</volume>
          {
          <fpage>233</fpage>
          ,
          <year>August 2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Michael</surname>
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Covington</surname>
          </string-name>
          ,
          <article-title>Srividhya Srinivasan Wende Long, Anind K. Dev</article-title>
          ., Mustaque Ahamad, and
          <string-name>
            <given-names>Gregory D.</given-names>
            <surname>Abowd</surname>
          </string-name>
          .
          <article-title>Securing context-aware applications using environment roles</article-title>
          .
          <source>In Proceedings of the sixth ACM symposium on Access control models and technologies</source>
          , pages
          <volume>10</volume>
          {
          <fpage>20</fpage>
          ,
          <string-name>
            <surname>Chantilly</surname>
          </string-name>
          , Virginia, United States,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>M.</given-names>
            <surname>Gasser</surname>
          </string-name>
          and
          <string-name>
            <surname>E. McDermott.</surname>
          </string-name>
          <article-title>An architecture for practical delegation a distributed system</article-title>
          .
          <source>In Proceedings of the IEEE Symposium on Research in Security and Privacy</source>
          , Oakland, California,
          <string-name>
            <surname>U.S.A.</surname>
          </string-name>
          ,
          <year>1990</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>H.M. Gladney</surname>
          </string-name>
          .
          <article-title>Access control for large collections</article-title>
          .
          <source>ACM Transactions on Information Systems</source>
          ,
          <volume>15</volume>
          (
          <issue>2</issue>
          ):
          <volume>154</volume>
          {
          <fpage>194</fpage>
          ,
          <string-name>
            <surname>April</surname>
          </string-name>
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>Dieter</given-names>
            <surname>Gollmann</surname>
          </string-name>
          .
          <source>Computer Security 2e. John Wiley and Sons</source>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Butler</surname>
            <given-names>Lampson</given-names>
          </string-name>
          ,
          <article-title>Mart n Abadi, Michael Burrows, and Edward Wobber. Authentication in distributed systems: theory and practice</article-title>
          .
          <source>ACM Transactions on Computer Systems (TOCS)</source>
          ,
          <volume>10</volume>
          (
          <issue>4</issue>
          ):
          <volume>265</volume>
          {
          <fpage>310</fpage>
          ,
          <string-name>
            <surname>November</surname>
          </string-name>
          <year>1992</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>Min</given-names>
            <surname>Li</surname>
          </string-name>
          and
          <string-name>
            <given-names>Hua</given-names>
            <surname>Wang</surname>
          </string-name>
          .
          <article-title>ABDM: An extended exible delegation model in RBAC</article-title>
          .
          <source>In Proceedings of the 8th IEEE International Conference on Computer and Information Technology</source>
          , pages
          <volume>390</volume>
          {
          <fpage>395</fpage>
          ,
          <string-name>
            <surname>Sydney</surname>
          </string-name>
          , Australia,
          <year>July 2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>Dwayne</given-names>
            <surname>Mercredi</surname>
          </string-name>
          and
          <string-name>
            <given-names>Rod</given-names>
            <surname>Frey</surname>
          </string-name>
          .
          <article-title>User login delegation</article-title>
          .
          <source>United States Patent Application Publication</source>
          ,
          <string-name>
            <surname>US</surname>
          </string-name>
          <year>2004</year>
          /0015702 A1,
          <year>January 2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>J.H.</given-names>
            <surname>Saltzer</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.D.</given-names>
            <surname>Schroeder</surname>
          </string-name>
          .
          <article-title>The protection of information in computer systems</article-title>
          .
          <source>Proceedings of IEEE</source>
          ,
          <volume>63</volume>
          (
          <issue>9</issue>
          ):
          <volume>1278</volume>
          {
          <fpage>1308</fpage>
          ,
          <year>September 1975</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Vijay</surname>
            <given-names>Varadharajan</given-names>
          </string-name>
          , Philip Allen, and
          <string-name>
            <given-names>Stewart</given-names>
            <surname>Black</surname>
          </string-name>
          .
          <article-title>An analysis of the proxy problem in distributed systems</article-title>
          .
          <source>In Proceedings of the IEEE Symposium on Research in Security and Privacy</source>
          , Oakland, California,
          <string-name>
            <surname>U.S.A.</surname>
          </string-name>
          ,
          <year>1991</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <given-names>Hua</given-names>
            <surname>Wang</surname>
          </string-name>
          and
          <string-name>
            <given-names>Jinli</given-names>
            <surname>Cao</surname>
          </string-name>
          .
          <source>Delegating revocations and authorizations</source>
          . Springer Berlin / Heidelberg Lecture Notes in Computer Science(LNCS),
          <volume>4928</volume>
          :
          <fpage>294</fpage>
          {
          <fpage>305</fpage>
          ,
          <year>February 2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Edward</surname>
            <given-names>Wobber</given-names>
          </string-name>
          ,
          <article-title>Mart n Abadi, Michael Burrows, and Butler Lampson. Authentication in the taos operating system</article-title>
          .
          <source>ACM Transactions on Computer Systems (TOCS)</source>
          ,
          <volume>12</volume>
          (
          <issue>1</issue>
          ):3{
          <fpage>32</fpage>
          ,
          <year>February 1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Longhua</surname>
            <given-names>Zhang</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gail-Joon Ahn</surname>
          </string-name>
          , and
          <string-name>
            <surname>Bei-Tseng Chu</surname>
          </string-name>
          .
          <article-title>A rule-based framework for role-based delegation and revocation</article-title>
          .
          <source>ACM Transactions on Information and System Security (TISSEC)</source>
          ,
          <volume>6</volume>
          (
          <issue>3</issue>
          ):
          <volume>404</volume>
          {
          <fpage>441</fpage>
          ,
          <year>August 2003</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>