<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Context-Aware Identity Delegation</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Naveed</forename><surname>Ahmed</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Informatics and Mathematical Modelling</orgName>
								<orgName type="institution">Technical University of Denmark</orgName>
								<address>
									<postCode>DK-2800</postCode>
									<settlement>Lyngby</settlement>
									<country key="DK">Denmark</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Christian</forename><forename type="middle">D</forename><surname>Jensen</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Informatics and Mathematical Modelling</orgName>
								<orgName type="institution">Technical University of Denmark</orgName>
								<address>
									<postCode>DK-2800</postCode>
									<settlement>Lyngby</settlement>
									<country key="DK">Denmark</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Context-Aware Identity Delegation</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">C28ACDD6176A98A4409822066BBB5A7E</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-23T21:01+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Context-aware</term>
					<term>Identity Delegation</term>
					<term>Nomadic User</term>
					<term>Practical Security</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In emerging ubiquitous computing, related nomadic users often perform similar tasks and share the same computing infrastructure. This means that security of the shared resources is of prime importance. Frequent delegation of tasks among users must be anticipated as most nomadic environments are hectic and very dynamic. A delegation mechanism with a slightly complicated user interface will not only reduce the productivity but also provide nomadic users with a strong motivation to circumvent the mechanism itself. Delegation in access control domain is not practical for the most of nomadic users due to its complicated and complex structure. Identity delegation at authentication level provides improved usability, which reduces the risk of circumventing the delegation mechanism; at the same time, however, identity delegation violates the principle of least privileges. We use contextual information of a delegatee to mitigate this violation, which helps to achieve a higher level of practical security in nomadic environments.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The pervasive use of computing technology in our life has caused a shift in how we interact with computers. Earlier, in the age of mainframes and desktops, a user had to physically move to a computer to access information or computing resources. When technology allowed manufacturing of lightweight devices along with a well connected wireless communication infrastructure, the paradigm of mobile computing emerged. This allows people to move freely in an environment along with their computing devices, so information and (modest) computing resources are ubiquitously available. More recently, we have started embedding computing devices into work environments, which makes the nomadic use of computing possible. Nomadic users move freely in their work environment and use shared devices that are embedded in the environment on which they can invoke their unique sessions. A typical example is a hospital, where computers and equipment are shared among doctors and nurses. These people access patients' health-care data from different terminals in wards using their unique identities.</p><p>In collaborative work environments, nomadic users often need to work in each other's place, for instance, in the nomadic environment of hospitals, a senior doctor may need to delegate his duties to another doctor when a patient in a critical condition arrives in the emergency unit. In this case, the senior doctor is primarily concerned with two things: to whom should he delegate and which of the patients and wards need to be taken care of. In the hectic environment of current hospitals, doctors generally prefer to simply share their passwords and sessions for the delegation <ref type="bibr" target="#b4">[5]</ref>, rather than doing so by a complicated procedure that may offer a higher level of security. For these nomadic users, it does not make sense to engage them beyond their simple concerns of Whom and Which for the purpose of delegation; otherwise, they would tend to circumvent the delegation mechanism due to its usability issues.</p><p>From a user's perspective, delegation is only concerned with the two simple questions: to whom one should delegate, the delegatee; and in which context the delegatee should be authorized to work on one's behalf. From a security perspective, however, it is also accompanied with fine level details of individual authorizations, in order to follow the principle of least privileges <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b14">15]</ref>. A pure security perspective represents one extreme, where a delegation mechanism has fine granularity and thus each privilege is transferred individually, however, this fine control also makes it cumbersome and error prone. Considering the usability perspective, delegation becomes more and more coarse grained, where many privileges are transferred simultaneously, at the expense of the principle of least privileges, but its simplicity could make it more user-friendly and thus more likely to be used in practice.</p><p>Delegation is necessarily regulated by a security policy, which defines the privileges of each user and their authority to delegate them. We call this the Designed Security Level. The designed security level is not an actual assessment of the security of the system, but captures the intentions of the designers through their specification of policies and choice of mechanisms. However, the security that we achieve in practice is often less than or at most equal to the designed level, we call this the Effective Security Level because security mechanisms may contain vulnerabilities and users may decide to circumvent the mechanism, e.g., by sharing passwords. Most systems are designed to achieve a specific level of security, which is perhaps mandated by legislation, so the designed security level tends to remain constant over time. The effective security level, however, tends to degrade with time as vulnerabilities are discovered -but not necessarily patched, advances in technology makes new attacks possible, new techniques in cryptanalysis are discovered or simply that the vigilance of users erode and shared passwords proliferate in the system. This increasing security gap between the designed and effective security levels is illustrated in Figure <ref type="figure" target="#fig_0">1</ref>.</p><p>It is important to note, however, that the curve shown in the figure is for illustrative purposes and exact shape of the curve is not relevant; the actual shape depends on the type of the system, the configuration and operation of the system, and parameters of the computational environment in which the system is deployed. For example, new security mechanisms, for which the users are not yet trained or aware of its purpose, the curve of effective security could have the positive slopes in the start. In any case, the poor usability in delegation provides a motivation to users for deceiving the access control mechanism by sharing their authentication tokens, which also contributes to the widening security gap.</p><p>The security gap could be reduced by improving the usability of delegation. The identity delegation at authentication level has a considerable usability advantage over classic delegation models, but on the expense of violating the principle of least privileges <ref type="bibr" target="#b1">[2]</ref>. Still, the identity delegation could provide more effective security than classic delegation mechanisms for many nomadic environments where there are pre-established trust relationships among users, such as in a group of doctors who work together in a hospital. We extend the identity delegation <ref type="bibr" target="#b1">[2]</ref> to include contextual information, which further increase the usability while at the same time provides more justifications to use the identity delegation despite of its obvious violation of the principle of least privileges. The use of context limits the unnecessary spread of authorizations. We have implemented the proposed mechanism in form of a prototype.</p><p>In the next section, we describe part of the state of the art in delegation. Section 3 presents our delegation mechanism in detail. In Section 4, we describe the details of the prototype. Section 5 provides evaluation of the mechanism. In the final section, we present some conclusions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Related Work</head><p>The term delegation has many definitions, for instance Abadi et al. <ref type="bibr" target="#b0">[1]</ref>, Barka and Sandhu <ref type="bibr" target="#b5">[6]</ref>, <ref type="bibr">Gasser and McDermott [9]</ref>, Gladney <ref type="bibr" target="#b9">[10]</ref>, etc. In the following, we adhere to the definition of Zhang et al. <ref type="bibr" target="#b18">[19]</ref>, i.e., we consider authentication as a process in which one active entity in a system transfers its authority to another active entity in order for that entity to carry out a job on behalf of the first entity. In this paper, we only focus on human-to-human delegation and consider a delegator who delegates his authorizations, while one who receives these authorizations is referred as a delegatee. <ref type="bibr" target="#b2">[3]</ref> Human-to-human delegation can be at access control level or at authentication level. At the access control level, <ref type="bibr">Gasser and McDermott [9]</ref> propose a delegation technique with cryptographic assurances of the revocation if the system is subsequently compromised. Varadharajan et al. <ref type="bibr" target="#b15">[16]</ref> consider delegation in distributed systems as the problem of verification for a delegatee using signature-based scheme with certain assumptions of trust relationships among the system entities. Zhang et al. <ref type="bibr" target="#b18">[19]</ref> propose a rule-based specification language and a rule-based framework for the role-based multi-step delegation. The delegation at permission level, although with very limited options, can also be accomplished in the UNIX access control model. A formal framework for delegation under Role Based Access Control(RBAC) is proposed by Barka <ref type="bibr" target="#b5">[6]</ref>. Bertino et al. <ref type="bibr" target="#b6">[7]</ref> presents the notion of context in form of Temporal-RBAC that supports periodic role enabling and the notion of time in form of temporal dependencies among permissions. Covington et al. <ref type="bibr" target="#b7">[8]</ref> extends the context of model beyond time by incorporating constraints of location and system status. Kumar et al. <ref type="bibr" target="#b3">[4]</ref> presents a formal context-sensitive RBAC model, which enables complex security policies using the context information.</p><p>At user's authentication level, an identity delegation essentially assigns the system identifier of a delegator to a delegatee. A framework at this level is invented by Mercredi and Frey <ref type="bibr" target="#b13">[14]</ref>, whose primary objective is to enable a person to sign in on the behalf of another person. Ahmed and Jensen <ref type="bibr" target="#b1">[2]</ref> propose a simpler architecture of identity delegation, which is derived from the usability factors of delegation in nomadic environments. Using sudo or su commands of UNIX are implementation dependent alternatives.</p><p>An identity delegation transfers all authorizations of a user most of which might not be required for the delegated job. Nevertheless, an identity delegation can be more user friendly as all the necessary privileges are delegated in one fell swoop along with the identity, while at access control level, it is usually hard for a user to figure out the exact privileges necessary for performing a particular job. Li and Wang <ref type="bibr" target="#b12">[13]</ref> address this problem in access control domain, by bundling the authorizations of a job in form of a unit. On the other hand, revocation of delegation is equally important and might be non-trivial <ref type="bibr" target="#b16">[17]</ref>.</p><p>In nomadic use of computing, where users frequently delegate to one another, complexity of delegation (and its revocation) results in poor usability and provides a strong incentive for users to bypass the secure way of delegation. As indicated by Bardram, et al. <ref type="bibr" target="#b4">[5]</ref>, users start sharing their authentication tokens for mutual collaboration. On the other hand, the existing user-friendly identity delegation techniques <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b1">2]</ref> do not consider the context and thus cause a wider spread of authorities, which restricts their use to a limited number of nomadic environments.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">The Mechanism for Context-Aware Identity Delegation</head><p>In the following discussion, the term Validated identity refers to the identity that an authentication mechanism concludes with help of one or more authentication techniques. Similarly, the so-called authenticated identity provided to an access control mechanism is referred as Effective identity.  In this paper, we extend the basic definition of identity delegation <ref type="bibr" target="#b1">[2]</ref> to include context information. "A context-aware identity delegation at authentication level is a process in which an authentication mechanism provides an From the delegator's perspective these two conditions are two simple decisions: whom to delegate; under which context to delegate. In this paper we only consider time of day and the network address of a computer as the context information, but the definition of context is not limited to these two factors.</p><p>The architecture of proposed mechanism is shown in Figure <ref type="figure" target="#fig_3">3</ref>. In our architecture, Authentication module is augmented by the three other modules and is shown as Authentication and Delegation(AD) part in Figure <ref type="figure" target="#fig_3">3</ref>. These three modules are Delegation Configuration, Delegation Controller and Context Monitor. The Delegation Configuration module contains the delegation policies that are currently active in the system. In the prototype, Delegation Configuration consists of a database, which contains Whom and Which specifications of the all delegations in a system. The Context Monitor captures and distributes the context information of a delegatee; in our case, it supplies the current time and the network address of the computer on which the delegatee is validated by an Authentication module. The Delegation Controller performs the translation from a validated identity to an effective identity depending on the delegation policy and input from the Context Monitor; it also records all delegation events in a local log file.</p><p>When a delegatee approaches a system, the claimed identity of the delegatee is validated by a classic authentication mechanism, in the usual way. After this, the module Delegation Controller maps the validated identity to an effective user identity based on the input from Delegation Configuration. Now, this effective identity is supplied to the access control mechanism. As defined earlier, this effective identity could either be of the delegatee or of the delegator, depending on the inputs from Delegation Configuration and Context Monitor. The figure shows that a user A can be recognized as a user B in the access control mechanism if B has previously delegated his identity to A and the current context of the system for A is same as previously specified by B.</p><p>The configuration in Delegation Configuration can be considered as the delegation policy of a system and is in the form of mappings between validated identity and effective identity. Each mapping relation is associated with some context constraints under which the relation holds. Additionally there is also a list of preferences for each system user that specifies the currently active identity among multiple available identities. Thus, depending on the mapping, context and the preferences a particular identity is provided to the access control mechanism.</p><p>We provide a simple user interface in the user's session to specify the delegation policy for new delegations and for changing existing policies. We refer to it as Delegation User Interface in the figure. This interface should only require from a user to decide to whom and under which context to delegate, so that the user does not worry about specific permissions, roles, security policy or security administrator.</p><p>The log file provides a level of accountability in the system. Since our mechanism is at authentication level, we cannot restrict unnecessary delegated authorizations as they are part of the access control domain. This drawback is inherited from the very nature of identity delegation and is justified by the log file and the assumption of mutual trust among co-workers and colleagues <ref type="bibr" target="#b1">[2]</ref>. In our mechanism we restrict the propagation of unnecessary authorizations by limiting the delegation in particular context specified by the delegator. In this way we increase the security of a system by limiting the violation of the principle of least privileges.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">The Prototype</head><p>The prototype consists of a personal computer running Debian Linux and is the extended version of our original prototype for identity delegation <ref type="bibr" target="#b1">[2]</ref>. We have augmented the classic login based authentication mechanism with RFID based authentication. In the idle state when no user is present on the system, multiple sessions of users are suspended and the computer display is locked. When a user approaches, the relevant session is invoked instantly if RFID badge is validated. This invoked session could be the session of the user or it can be a delegated session. This selection depends on the preference in the delegation configuration, which can easily be changed by a simple command. The interaction of the Fig. <ref type="figure">4</ref>. Architecture of the Prototype different modules in the prototype is shown in Figure <ref type="figure">4</ref>. We have not shown Delegation Configuration and Log file. Context Monitor, which in our case consists of the system timer and the network address, is also not shown. RFID Authentication module grants or denies an authentication request using the identification which it receives from the RFID reader. Delegation Controller is launched with the privileges of "root" at start-up, just before GNOME display manager(GDM) is started. In the GNOME based desktop, a single GDM manages the sessions (X-Servers) of all users. The Delegation Controller in the prototype interacts with GDM, by sending commands in a customized format through Clients that run in each of the user's sessions. GDM provides an abstraction for multiple sessions and also invokes the password based login program (GDMlogin). However, GDMlogin program is only a front end for interacting with a user, the actual authentication is achieved by a pluggable authentication module associated with GDM. We use network sockets for the interprocess communication, in order to simplify its porting on distributed nomadic networks.</p><p>In typical use, a user carrying a valid RFID tag enters into the interrogation field of an RFID reader. The RFID reader reports the identification to the RFID Authentication module, which checks this identification in the local database to find a match for a system user. If a match is found, the Delegation Controller maps the matched identification (validated identity) to a new identification (effective identity) based on the status of the delegation configuration and the current context. As shown in the figure, the context in our case is limited to a pseudo location imm.322.11 and the time of day. After deciding the effective identity, Delegation Controller activates the corresponding session.</p><p>For the delegation purpose, we have developed a console program in user's space, which represents the user interface for delegation. For example, if a user Bob wants to delegate his session to a user Alice, for the office hours on a computer in Room 11 of Building 322, he issues the following simple command. &gt;dlg set Alice @imm.322.011 [0800-1600] Now, if Alice is in the right context, i.e. Room 11 of Building 322 between 8 am and 4 pm, then she can invoke B's session in one of the following way. Firstly, if she does not have her local account on the machine then the B's session can be invoked automatically when she walks up to the terminal. Secondly, if her local account exists on the machine and she has previously specified her preference for B's session on the machine then again the session can be invoked automatically. Lastly, if her local account exists but she has not previously used B'session then she need to issue following simple command from the terminal.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>&gt;dlg switch Bob</head><p>And finally when Bob want to revoke the delegation, he uses the following command.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>&gt;dlg reset Alice</head><p>Besides this basic example, there are many more user-friendly commands for different aspects of delegation. The use of location and time in the example is only one possible form of context and in principle, other parameters can be included, though we have not implemented them in the prototype. All the commands of delegation in the prototype share a common motive, which is the simplicity of user interface as we aim to make the delegation process to be more user friendly so that nomadic users actually use it rather than to circumvent it. The syntax of the delegation program is as follow. Invoking dlg without any argument shows help for the command. Otherwise, set is for setting an outbound delegation, reset is for revoking an existing outbound delegation, switch is to switch among delegated sessions, reset-rec is to revoke all inbound delegated sessions, get is for getting information from existing delegation policy, reset-all is for resetting all outbound delegations in one go.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Comparison and a Formal Model</head><p>Similar to any delegation mechanism developed in the authentication domain, our mechanism violates the principle of least privileges <ref type="bibr" target="#b2">[3]</ref>, but we believe that this is justified in nomadic environments, where there are pre-established trust relationships among users <ref type="bibr" target="#b1">[2]</ref>. The use of context limits the proliferation of unnecessary authorizations, which makes our mechanism more secure than a simple identity delegation at authentication level.</p><p>If the delegation is fine grained, then there is always a risk of under-delegation, which effectively results in a denial of service; this is very undesirable in most cases. Similarly, revocation becomes non-trivial in some fine grained delegation mechanisms designed at access control level. In our mechanism, delegation and revocation are just a matter of issuing a simple command.</p><p>The classic access control models of UNIX and Unix-like systems may achieve delegation by changing file permissions and group memberships, but this also implies that one should be either the owner of the resource or must have super user privileges; A user is not necessarily able to delegate all privileges which he is authorized to use. In our mechanism this problem is removed and delegation is a user level decision.</p><p>In order to compare our mechanism with classic delegation techniques we use a formal logic <ref type="bibr" target="#b17">[18,</ref><ref type="bibr" target="#b0">1,</ref><ref type="bibr" target="#b11">12]</ref>. We start by introducing a few notions from this logic. When we write A says S, it implies that the entity A utters the statement S and believes in its truthfulness. We write A ⇒ B to represent a kind of trust relationship in a way that whenever A makes a statement, B makes it too. Since the statement, made by a particular entity of the system, implies that the entity believes in it, thus the statement A ⇒ B represents the trust of B on A. We write A as R to represent the entity A in a particular role R and consequently A as R has a subset of all authorizations that A normally possesses. For instance, A token represents the role of A that possesses the correct authentication token of A. Similarly, A context represents a particular context of A. We write (A | B) says S to represent that A is quoting a statement, S, of B. We write (A for B) says S to represent a quoted statement S and in addition, A is authorized to make such quoted statements on the behalf of B.</p><p>Each entity has a set of authorizations, which it can transfer or delegate to other entities in the system using following axioms. Now, let us consider Figure <ref type="figure" target="#fig_3">3</ref> and divide it in three system level entities: the user, A; the authentication and the delegation primitives enclosed in the rectangle of the figure, AD; and the access control mechanism, AC. We also assume that the only role of the authentication module AD is to provide the identity of a user. The default trust relationships between these entities are represented by the following statements. AD ⇒ AC . . . (3) (The access control mechanism trusts the authentication mechanism and thus the access control mechanism believes in the identity provided by the authentication mechanism.)</p><p>A as A token ⇒ AD . . . (4a) and B as B token ⇒ AD . . . (4b) (The authentication mechanism trusts a user with the role of possessing the correct authentication credentials in the form of a valid token that corresponds to the user in the authentication database. )</p><p>The statements (3) and ( <ref type="formula">4</ref>) are enough to complete the trust chain from a user to the access control mechanism in order to invoke a user's session. For example a user A with A'token can invoke A'session. In our context aware identity delegation mechanism, a user A may delegate his identity to another user B by sending a request to the authentication mechanism in the following form.</p><p>(A as A token) says (((B as B token)and(B as B Context))|(A as A token)) ⇒ A as A token) . . . ( <ref type="formula">5</ref>) (An authenticated user A tells the authentication mechanism that if the authenticated user B, in a 'Context', quotes a statement of the authenticated user A then it must be considered as the actual statement from the authenticated user A. The user A specifies Context, in the form of environmental constraints, such as time, location, etc. ) Due to the formal logic axioms, the effect of the statement (5) is the following new trust relationship, which is in fact the context-aware identity delegation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>(((B as B token)and(B as B Context))|(A as A token))</head><p>⇒ A as A token . . . <ref type="bibr" target="#b5">(6)</ref> The statement <ref type="bibr" target="#b5">(6)</ref> represents that if a user B, in a specific context, requests for the session of user A, then this request is considered to be equivalent to the request directly made by the user A, which was in form of the statement (4a). Note that the identity delegation represented by ( <ref type="formula">6</ref>) is different from the transfer of authorities in (1) and the classic delegation of (2). In (1) the identity of the delegator A is completely lost and in (2) the identity of delegator is present in all requests made by the delegatee. In our mechanism of (6) the identity of the delegator A is only present in the authentication and thus the access control mechanism does not distinguish between a delegator and a delegatee.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusions</head><p>In nomadic environments, the usability of delegation is a decisive parameter in determining the effective level of system security. People in such environments mostly delegate to their co-workers and colleagues in whom they trust. This fact along with use of context and the logging of delegation events can be used to justify the security of our mechanism in nomadic environments. Since we provide a user friendly interface for delegation, thus many more people will use this secure way of delegation rather than attempt to deceive the access control mechanism for delegating their authorities, which helps to improve the effective level of security.</p><p>Despite the obvious security improvement, however, we have not conducted an evaluation to determine exact quantitative values and therefore our claims are only justified by intuitive arguments of the paper; nevertheless, finding good metrics for the accurate measure of security is an open field of research <ref type="bibr" target="#b10">[11]</ref>.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Difference between Effective and Designed Security Levels</figDesc><graphic coords="3,186.64,115.83,242.08,177.95" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Difference Between the Two Approaches for Delegation</figDesc><graphic coords="5,152.06,207.48,311.25,235.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 2</head><label>2</label><figDesc>Figure2exemplifies the two approaches for delegation: the delegation in access control domain; and the delegation in authentication domain. In the former case, a validated identity and the corresponding effective identity are assumed to be the same and therefore delegation is managed in the access control domain in terms of permissions and roles; as shown, a delegatee A is recognized as A in the access control domain and has the authorizations of A as well as of B. Delegation in authentication domain is achieved by distinguishing the notions of validated identity and effective identity. As shown in the lower part of the figure, a delegatee A, who is authenticated as A, may assume the effective identity of either A or B. This allows A to use the authorizations of either A or B, depending on the choice of effective identity.In this paper, we extend the basic definition of identity delegation<ref type="bibr" target="#b1">[2]</ref> to include context information. "A context-aware identity delegation at authentication level is a process in which an authentication mechanism provides an</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Context-Aware Identity Delegation at Authentication Level</figDesc><graphic coords="6,169.35,115.83,276.66,212.66" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head></head><label></label><figDesc>Syntax::= dlg &lt;action&gt; &lt;parameters&gt; &lt;action&gt;::= set | reset | switch | reset-rec | get | reset-all | NULL set:&lt;parameters&gt;::= &lt;user_login_name&gt; &lt;context&gt; &lt;context&gt;::= @&lt;location&gt; [&lt;time_period&gt;] reset:&lt;parameter&gt;::= &lt;user_login_name&gt; reset-rec:&lt;parameters&gt;::= NULL get:&lt;parameters&gt; ::= NULL reset-all:&lt;parameters&gt; ::= NULL</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>If</head><label></label><figDesc>A says (B ⇒ A) then (B ⇒ A) for the system . . . (1) (This axiom represents the transfer of authorities from A to B.) If A says ((B | A) ⇒ (B for A)) then ((B | A) ⇒ (B for A)) for the system . . . (2) (This axiom is the classic identity delegation in access control domain as the identity of A is retained)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="8,152.06,163.65,311.25,265.30" type="bitmap" /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A calculus for access control in distributed systems</title>
		<author>
			<persName><forename type="first">Martín</forename><surname>Abadi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Michael</forename><surname>Burrows</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Butler</forename><surname>Lampson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gordon</forename><surname>Plotkin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Transactions on Programming Languages and Systems (TOPLAS)</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="706" to="734" />
			<date type="published" when="1993-09">September 1993</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A mechanism for identity delegation at authentication level</title>
		<author>
			<persName><forename type="first">Naveed</forename><surname>Ahmed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Christian</forename><forename type="middle">D</forename><surname>Jensen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The 14th Nordic Conference in Secure IT Systems, NordSec-2009</title>
				<meeting><address><addrLine>Oslo, Norway</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2009-10">October 2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">On-demand Restricted Delegation: A Framework for Dynamic, Context-Aware, Least-Privilege Delegation in Grids</title>
		<author>
			<persName><forename type="first">Mehran</forename><surname>Ahsant</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
		<respStmt>
			<orgName>Kungliga Tekniska Högskolan</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">PhD thesis</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Context sensitivity in role-based access contro</title>
		<author>
			<persName><forename type="first">Girish</forename><surname>Chafle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Arun</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Neeran</forename><surname>Karnik</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM SIGOPS Operating Systems Review</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="53" to="66" />
			<date type="published" when="2002-07">July 2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Mobility in health carereporting on our initial observations and pilot study</title>
		<author>
			<persName><forename type="first">Jakob</forename><surname>Bardram</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Thomas</forename><forename type="middle">K</forename></persName>
		</author>
		<author>
			<persName><forename type="first">Christina</forename><surname>Nielsen</surname></persName>
		</author>
		<idno>CfPC 2003-PB-52</idno>
		<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
		<respStmt>
			<orgName>Center for Pervasive Computing</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Framework for Role-Based Delegation Models</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ezedin</surname></persName>
		</author>
		<author>
			<persName><surname>Barka</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2002">2002</date>
		</imprint>
		<respStmt>
			<orgName>George Mason University</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">PhD thesis</note>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Trbac: A temporal rolebased access control model</title>
		<author>
			<persName><forename type="first">Elisa</forename><surname>Bertino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Andrea</forename><surname>Piero</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Elena</forename><surname>Bonatti</surname></persName>
		</author>
		<author>
			<persName><surname>Ferrari</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Transactions on Information and System Security (TISSEC)</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="191" to="233" />
			<date type="published" when="2001-08">August 2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Securing context-aware applications using environment roles</title>
		<author>
			<persName><forename type="first">J</forename><surname>Michael</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Srividhya</forename><surname>Covington</surname></persName>
		</author>
		<author>
			<persName><surname>Srinivasan Wende</surname></persName>
		</author>
		<author>
			<persName><surname>Long</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Anind</surname></persName>
		</author>
		<author>
			<persName><surname>Dev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gregory</forename><forename type="middle">D</forename><surname>Mustaque Ahamad</surname></persName>
		</author>
		<author>
			<persName><surname>Abowd</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the sixth ACM symposium on Access control models and technologies</title>
				<meeting>the sixth ACM symposium on Access control models and technologies<address><addrLine>Chantilly, Virginia, United States</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2001">2001</date>
			<biblScope unit="page" from="10" to="20" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">An architecture for practical delegation a distributed system</title>
		<author>
			<persName><forename type="first">M</forename><surname>Gasser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Mcdermott</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IEEE Symposium on Research in Security and Privacy</title>
				<meeting>the IEEE Symposium on Research in Security and Privacy<address><addrLine>Oakland, California, U.S.A.</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1990">1990</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Access control for large collections</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">M</forename><surname>Gladney</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Transactions on Information Systems</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="154" to="194" />
			<date type="published" when="1997-04">April 1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Computer Security 2e</title>
		<author>
			<persName><forename type="first">Dieter</forename><surname>Gollmann</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
			<publisher>John Wiley and Sons</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Authentication in distributed systems: theory and practice</title>
		<author>
			<persName><forename type="first">Martín</forename><surname>Butler Lampson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Michael</forename><surname>Abadi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Edward</forename><surname>Burrows</surname></persName>
		</author>
		<author>
			<persName><surname>Wobber</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Transactions on Computer Systems (TOCS)</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="265" to="310" />
			<date type="published" when="1992-11">November 1992</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">ABDM: An extended flexible delegation model in RBAC</title>
		<author>
			<persName><forename type="first">Min</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hua</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 8th IEEE International Conference on Computer and Information Technology</title>
				<meeting>the 8th IEEE International Conference on Computer and Information Technology<address><addrLine>Sydney, Australia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2008-07">July 2008</date>
			<biblScope unit="page" from="390" to="395" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">User login delegation</title>
		<author>
			<persName><forename type="first">Dwayne</forename><surname>Mercredi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Rod</forename><surname>Frey</surname></persName>
		</author>
		<idno>US 2004/0015702 A1</idno>
	</analytic>
	<monogr>
		<title level="m">United States Patent Application Publication</title>
				<imprint>
			<date type="published" when="2004-01">January 2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">The protection of information in computer systems</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">H</forename><surname>Saltzer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">D</forename><surname>Schroeder</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of IEEE</title>
				<meeting>IEEE</meeting>
		<imprint>
			<date type="published" when="1975-09">September 1975</date>
			<biblScope unit="volume">63</biblScope>
			<biblScope unit="page" from="1278" to="1308" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">An analysis of the proxy problem in distributed systems</title>
		<author>
			<persName><forename type="first">Vijay</forename><surname>Varadharajan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Philip</forename><surname>Allen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Stewart</forename><surname>Black</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IEEE Symposium on Research in Security and Privacy</title>
				<meeting>the IEEE Symposium on Research in Security and Privacy<address><addrLine>Oakland, California, U.S.A.</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1991">1991</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Delegating revocations and authorizations</title>
		<author>
			<persName><forename type="first">Hua</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jinli</forename><surname>Cao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Springer Berlin / Heidelberg Lecture Notes in Computer Science(LNCS</title>
		<imprint>
			<biblScope unit="volume">4928</biblScope>
			<biblScope unit="page" from="294" to="305" />
			<date type="published" when="2008-02">February 2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Authentication in the taos operating system</title>
		<author>
			<persName><forename type="first">Edward</forename><surname>Wobber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Martín</forename><surname>Abadi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Michael</forename><surname>Burrows</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Butler</forename><surname>Lampson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Transactions on Computer Systems (TOCS)</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="3" to="32" />
			<date type="published" when="1994-02">February 1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">A rule-based framework for role-based delegation and revocation</title>
		<author>
			<persName><forename type="first">Longhua</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gail-Joon</forename><surname>Ahn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Bei-Tseng</forename><surname>Chu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Transactions on Information and System Security (TISSEC)</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="404" to="441" />
			<date type="published" when="2003-08">August 2003</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
