نتایج جستجو برای: authorization propagation

تعداد نتایج: 115609  

Journal: :Journal of Computer Security 2000
Vijayalakshmi Atluri Wei-kuang Huang

Workflow Management Systems (WFMS) are being widely used today by organizations to coordinate the execution of various applications representing their day-to-day tasks. To ensure that these tasks are executed by authorized users or processes (subjects), and to make sure that authorized subjects gain access on the required objects only during the execution of the specific task, granting and revo...

1998
Vijay Varadharajan C. Crall Joe Pato

As companies migrate from a centralized to a distributed computing environment, the administration and management of security policies, in particular authorization policies, is becoming an increasingly difficult task. This paper considers the design of an authorization system that is suitable for distributed applications. It discusses the architectural design principles, describes the construct...

2017

Prior Authorization Information Pre-service approval is required for all inpatient services for all products. See below for situations where prior authorization may be required or may not be required for outpatient services. Yes indicates that prior authorization is required. No indicates that prior authorization is not required. N/A indicates that this service is primarily performed in an inpa...

2008
Haiyang Sun Xin Wang Jian Yang Yanchun Zhang

Collaborative business can become unreliable in terms of authorization policy conflicts, for example, when (1) incorrect role assignment or modification occurs in a service within one organization or (2) messages transferred from one organization are accessed by unqualified roles in other collaborating business partners. Therefore reliability verification based on access policies is critical fo...

Journal: :EPJ Web of Conferences 2019

Journal: :International Journal of Database Management Systems 2019

Journal: :IEEE Transactions on Cloud Computing 2014

Journal: :International Journal of Multicultural and Multireligious Understanding 2019

Journal: :Journal of Computer Security 2007

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید