Security Violation Detection for RBAC Based Interoperation in Distributed Environment
نویسندگان
چکیده
منابع مشابه
Security Management for Distributed Environment
–A mobile database is a database that can be connected to by a mobile computing device over a mobile network. Mobile processed information in database systems is distributed, heterogeneous, and replicated. They are endangered by various threats based on user’s mobility and restricted mobile resources of portable devices and wireless links. Since mobile circumstances can be very dynamic, standar...
متن کاملRbac/mac Security for Uml
In software construction, analysis investigates system requirements and design captures system functionality. To facilitate analysis and design, one popular technique is the unified modeling language, UML. In UML, there are use-case diagrams for the interaction of users with system components, class diagrams for the static classes and relations among them, and sequence diagrams for the dynamic ...
متن کاملSchema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, especially in enterprise with large number of users and XML objects as well as complex authorizations administration. In this paper, a role-based access control (RBAC) model based on XML Schema is proposed. RBAC has been ...
متن کاملUser Role - Based Security Model for a Distributed Environment
A distributed resource environment (DRE) allows distributed components (i.e., servers, legacy systems, databases, COTs, printers, scanners, etc.) to be treated akin to OS resources, where each component (resource) can publish services (an API), that are then available for use by clients and resources alike. DREs have lagged in support of security. To address this de ciency, this paper concentra...
متن کاملXML for RBAC Administration in Enterprise Environment
We have proposed an object -oriented RBAC (ORBAC) model to efficiently represent the real world. Though ORBAC is a good model, administration of ORBAC including creating and maintaining an access control security policy still remains a challengeable problem. In this paper, we present a practical method that can be employed in an enterprise environment to manage security policies using eXtensibl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Information and Systems
سال: 2008
ISSN: 0916-8532,1745-1361
DOI: 10.1093/ietisy/e91-d.5.1447