Abstract
It is a standard feature of all organisations that designated agents, usually when acting in specific roles, are empowered by the organisation to create specified kinds of states of affairs – as when, for instance, a priest declares a couple as married and thereby makes it so in the eye of the church, or when a head of department assigns one of his subordinates to a particular project, or when an owner transfers ownership, as opposed to mere physical possession, of an item to another entity. This feature of organisations is referred to variously as ‘(legal) power’, ‘(legal) competence‘, or ‘(legal) capacity’. Jones and Sergot [5] use the term institutionalised power to emphasise that this is not a feature of legal systems alone but commonplace in all organisations. The neutral term ‘institution’ is used by them, and other authors, for any kind of formal or informal organisation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 1–23. Springer, Heidelberg (1992)
Chellas, B.F.: Modal Logic - An Introduction. Cambridge University Press, Cambridge (1980)
Crispo, B.: Delegation of responsibility. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol. 1550, pp. 118–124. Springer, Heidelberg (1999)
Sadighi Firozabadi, B., Tan, Y.H., Lee, R.M.: Formal definitions of fraud. In: McNamara, P., Prakken, H. (eds.) Norms, Logics and Information Systems - New Studies in Deontic Logic and Computer Science, pp. 275–288. IOS Press, Amsterdam (1999)
Jones, A.J.I., Sergot, M.J.: A formal characterisation of institutionalised power. Journal IGPL 4(3), 429–445 (1996)
Makinson, D.: On the formal representation of right relations. Journal of Philosophical Logic 15, 403–425 (1986)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role based access control models. IEEE Computer 29(2), 38–47 (1996)
Searl, J.R.: Speech Acts. Cambridge University Press, Cambridge (1969)
Vanderverken, D.: On the unification of speech act theory and formal semantics. In: Cohen, P.R., Morgan, J., Pollack, M.E. (eds.) Intentions in Communication, ch. 11, pp. 195–220. The MIT Press, Cambridge (1990)
Yialelis, N., Sloman, M.: A security framework supporting domain based access control in distributed systems. In: ISOC Symposium on Network and Distributed Systems Security (SNDSS 1996), San Diego, California, pp. 26–39. IEEE Press, Los Alamitos (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Firozabadi, B.S., Sergot, M. (2000). Power and Permission in Security Systems. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 1999. Lecture Notes in Computer Science, vol 1796. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10720107_6
Download citation
DOI: https://doi.org/10.1007/10720107_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67381-1
Online ISBN: 978-3-540-45570-7
eBook Packages: Springer Book Archive