Formal Policy based Authorization Model for Ubiquitous Enterprise Computing Environment

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formal Policy based Authorization Model for Ubiquitous Enterprise Computing Environment

M. Weiser 1991, "The Computer for the Twenty-First Century," in Scientific American, vol. 265, 1991, pp. 94-104. M. Weiser 1993, Ubiquitous Computing, Computer, v. 26 n. 10, p. 71-72. Lampson, Butler W. 1971. "Protection". Proceedings of the 5th Princeton Conference on Information Sciences and Systems. p. 437. David F. Ferraiolo and D. Richard Kuhn 1992, "Role-Based Acc...

متن کامل

A Formal Authorization Policy Model

This paper presents a formal model that interprets authorization policy behaviors. The model establishes a connection of applying authorization policies on an administration domain with dissecting the domain into the authorized, denied, and undefined divisions. This connection enables us to analyze authorization policy development problems such as policy merge, inconsistency, ambiguity, and red...

متن کامل

Security, Authorization, and Authentication for Enterprise Computing

Enterprise computing (EC) is the recognition that to effectively utilize and disseminate information within an entity (university, corporation, government agency, etc.) it will be necessary to design and develop integrated distributed computing environments that allow all types of existing and future systems to interoperate. In EC, there are legacy, COTS, database, and new client/server applica...

متن کامل

A Formal Policy Oriented Access Control Model for Secure Enterprise Network Environment

In this paper we use Security Evaluation Criteria as basis to develop the Network access control model for enterprise wide network computing environment. The Network access control model addresses both the access control and information flow control requirements of the enterprise network system. The security architecture of the model attempts to ensure authorized access to network resources and...

متن کامل

ÆTHER: an Authorization Management Architecture for Ubiquitous Computing

The ubiquitous computing paradigm suggests that we are going to be surrounded by countless wireless devices capable of providing services transparently. By definition, the nature of ubiquitous computing environments is open and extremely dynamic, making difficult the establishment of predefined security relationships between all of the participating entities. Authentication mechanisms can be em...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2013

ISSN: 0975-8887

DOI: 10.5120/12746-9668