A protection model incorporating both authorization and constraints
نویسندگان
چکیده
منابع مشابه
A Software Authorization and Protection Model for Mobile Code Systems
In this paper, a model for software authorization and protection in mobile code systems is proposed. In the model, a software is partitioned into objects, called mobile agents, and the privileges to access these agents are separated and distributed to the user’s local system and a number of trusted servers called trusted computational proxies. The execution of a program (software) is conducted ...
متن کاملAn Authorization Model for Supporting the Speciication and Enforcement of Authorization Constraints in Workkow Management Systems
In recent years, workkow management systems (WFMSs) have gained popularity both in research as well as in commercial sectors. WFMSs are used to coordinate and streamline business processes of an organization. Often, very large WFMSs are used in organizations with users in the range of several thousands and number of process instances in the range of tens of thousands. To simplify the complexity...
متن کاملAuthorization Constraints Specification and Enforcement
Constraints are an important aspect of role-based access control (RBAC) and its different extensions. They are often regarded as one of the principal motivations behind these access control models. There are two important issues relating to constraints: their specification and their enforcement. However, the existing approaches cannot comprehensively support both of them. On the other hand, the...
متن کاملRole - based Authorization Constraints Speci
Constraints are an important aspect of role-based access control (RBAC) and are often regarded as one of the principal motivations behind RBAC. Although the importance of constraints in RBAC has been recognized for a long time, they have not received much attention. In this paper, we introduce an intuitive formal language for specifying role-based authorization constraints named RCL 2000 includ...
متن کاملIncorporating Business Requirements and Constraints in Database Conceptual Model
Entity relationship (ER) approach is predominantly used for conceptual modelling of database systems in terms of entities and their relationships. The approach does not provide sufficient support for incorporating business constraints and their impact on the entity relationships, thus leaving a gap between the requirements elicitation and database implementation. This paper makes an attempt to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Security
سال: 1992
ISSN: 0167-4048
DOI: 10.1016/0167-4048(92)90221-c