2 RELATED WORK
This section summarizes previous works related to
delegation, access control models, and technical spec-
ifications.
Research on delegation and access control to
enhance the role-based access control (RBAC)
model (Sandhu et al., 1996) has frequently been re-
ported (Barka and Sandhu, 2000; Zhang et al., 2003;
Wainer and Kumar, 2005; Joshi and Bertino, 2006).
When these works are combined with RBAC, they are
effective for delegation, especially in a single domain
or a closed environment such as an enterprise system,
because roles generally have a hierarchical structure
reflecting the users’ position therein.
Another important line of contribution focused
on dynamic and flexible delegation methods in dis-
tributed and multiple security domains (Li et al.,
2003; Pham et al., 2008; Bussard et al., 2009; Chad-
wick et al.,2009). These works proposed access con-
trol models that support dynamic permission assign-
ment at the point of delegation, which is relevant to
the work proposed in this paper. However, this work
differs in that it focuses on a practical method and
system design for transferring information after dele-
gation authorization beyond security domain bound-
aries.
Another line of research related to delegation is
fine-grained access control models (Hasebe et al.,
2010; Cohen et al., 2002). While that research fo-
cused on conceptual access control models, this work
focuses more on key technologies for dynamic access
control and permission assignment from the view-
point of design and implementation. In the techni-
cal approach of SPKI (Ellison et al., 1999) and that
proposed by Gomi et al. (Gomi et al., 2005), certifi-
cates of authorization rights are distributed and trans-
ferred from one person to another. They focused on
the specification of the certificates whereas this work
specifically introduces an access management model
using access tokens.
Some emerging technical specifications provide
schemes for exchanging identity information using a
token made up of short lengths of string, which is rele-
vant to the work proposed in this paper. SAML (OA-
SIS) works by specifying a scheme for exchanging
identity information using an artifact, which is a ref-
erence to an assertion containing the information.
However, the artifacts are not specifically designed
for delegation of authority and can only be used by
trusted entities, not persons. OAuth (OAuth, 2009)
provides a method for delegation from user to appli-
cation by means of an access token. In contrast, this
work focuses on a more generic access model and its
Delegation
Financial planning
request
Bob (husband)
Internet service provider
(ISP)
Financial planning center
(FPC)
Alice (wife)
Bob’s
pension
records
Bob’s pension record
request
Stores and reviews pension records
Bob’s pension record request
Figure 1: Motivating scenarios.
design framework for user-to-user delegation of au-
thority. In addition, SAML and OAuth do not provide
any scheme for controlling token access.
3 MOTIVATING SCENARIOS
This section describes two scenarios that illustrate the
motivation behind this work (Fig. 1). Bob and Alice
are a married couple who are working for different
companies. They are interested in financial planning
to reduce their income taxes, repay their loans, and
prepare for their future. Bob has already stored his
pension records on his account managed by an Inter-
net service provider (ISP) and views the information
privately. Alice would like to view his information
by accessing the ISP so that she can consider their
planning by herself from their family’s perspective.
In this case, the ISP needs to identify who Alice is
and what she wants in order to ensure an appropriate
access control for the request.
Alice is also considering signing up for a financial
planning service publicized by a financial planning
center (FPC) on the Internet. Such a service would
require her to display her and Bob’s current finan-
cial status to offer an ideal plan for their future lives.
In this case, Bob’s pension records at the ISP need
to be provided to the FPC in a secure and privacy-
preserving manner because the FPC can only provide
Alice with the service on its site. If we assume that the
FPC requests access to Bob’s pension records man-
aged by the ISP, the access request needs to be identi-
fied by the ISP in the same way as it identified Alice’s
original request.
In both scenarios, because Alice is the recipi-
ent of the services using Bob’s pension records—in
other words, one person is accessing and using an-
other person’s data—Alice’s access needs to be au-
thorized by Bob, even though they are married, before
the ISP will accept her request for his data regardless
of whether it is via the FPC or not. In order to do
so, Alice needs to be provided with an appropriate
privilege to access Bob’s pension records and use the
SECRYPT 2011 - International Conference on Security and Cryptography
458