نتایج جستجو برای: authorization model

تعداد نتایج: 2110553  

2011
Alessandro Armando Silvio Ranise

Business processes are usually specified by workflows extended with access control policies. In previous works, automated techniques have been developed for the analysis of authorization constraints of workflows. One of main drawback of available approaches is that only a bounded number of workflow instances is considered and analyses are limited to consider intra-instance authorization constra...

2006
Weide Zhang David Del Vecchio Glenn S. Wasson Marty Humphrey

While much of the Grid security community has focused on developing new authorization systems, the real challenge is often integrating legacy authorization systems with Grid software. The existing authorization system might not understand Grid authentication, might not scale to Grid-level usage, might not be able to understand the operations that are requested to be authorized, and might requir...

2005
Sarath Indrakanti Vijay Varadharajan Michael Hitchens

This paper proposes an authorization architecture for Web services. It describes the architectural framework, the administration and runtime aspects of our architecture and its components for secure authorization of Web services as well as the support for the management of authorization information. The paper also describes authorization algorithms required to authorize a Web service client. Th...

2005
Xinwen Zhang Yingjiu Li Divya Nalla

In traditional access control models like mandatory access control (MAC), discretionary access control (DAC), and role-based access control (RBAC), authorization decisions are determined according to the identities of subjects and objects, which are authenticated by a system completely. Recent access control practices, such as digital rights management (DRM), trust management, and usage control...

1998
G. Gheorghiu Tatyana Ryutov B. Clifford Neuman

One of the most difficult problems to be solved by metacomputing systems is to ensure strong authentication and authorization. The problem is complicated since the hosts involved in a metacomputing environment often span multiple administrative domains, each with its own security policy. This paper presents a distributed authorization model used by our resource allocation system, the Prospero R...

Journal: :Glasnik Advokatske komore Vojvodine 2012

Journal: :Circulation: Cardiovascular Quality and Outcomes 2019

Journal: :Journal of the American College of Cardiology 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید