Formal Policy based Authorization Model for Ubiquitous Enterprise Computing Environment
نویسندگان
چکیده
منابع مشابه
Formal Policy based Authorization Model for Ubiquitous Enterprise Computing Environment
M. Weiser 1991, "The Computer for the Twenty-First Century," in Scientific American, vol. 265, 1991, pp. 94-104. M. Weiser 1993, Ubiquitous Computing, Computer, v. 26 n. 10, p. 71-72. Lampson, Butler W. 1971. "Protection". Proceedings of the 5th Princeton Conference on Information Sciences and Systems. p. 437. David F. Ferraiolo and D. Richard Kuhn 1992, "Role-Based Acc...
متن کاملA Formal Authorization Policy Model
This paper presents a formal model that interprets authorization policy behaviors. The model establishes a connection of applying authorization policies on an administration domain with dissecting the domain into the authorized, denied, and undefined divisions. This connection enables us to analyze authorization policy development problems such as policy merge, inconsistency, ambiguity, and red...
متن کاملSecurity, Authorization, and Authentication for Enterprise Computing
Enterprise computing (EC) is the recognition that to effectively utilize and disseminate information within an entity (university, corporation, government agency, etc.) it will be necessary to design and develop integrated distributed computing environments that allow all types of existing and future systems to interoperate. In EC, there are legacy, COTS, database, and new client/server applica...
متن کاملA Formal Policy Oriented Access Control Model for Secure Enterprise Network Environment
In this paper we use Security Evaluation Criteria as basis to develop the Network access control model for enterprise wide network computing environment. The Network access control model addresses both the access control and information flow control requirements of the enterprise network system. The security architecture of the model attempts to ensure authorized access to network resources and...
متن کاملÆTHER: an Authorization Management Architecture for Ubiquitous Computing
The ubiquitous computing paradigm suggests that we are going to be surrounded by countless wireless devices capable of providing services transparently. By definition, the nature of ubiquitous computing environments is open and extremely dynamic, making difficult the establishment of predefined security relationships between all of the participating entities. Authentication mechanisms can be em...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2013
ISSN: 0975-8887
DOI: 10.5120/12746-9668