نتایج جستجو برای: authorization model

تعداد نتایج: 2110553  

2008
Steffen Bartsch Karsten Sohr Carsten Bormann

Custom SME applications for collaboration and workflow have become affordable when implemented as Web applications employing Agile methodologies. Security engineering is still difficult with Agile development, though: heavy-weight processes put the improvements of Agile development at risk. We propose Agile security engineering and increased end-user involvement to improve Agile development wit...

2005
Isaac Agudo Javier Lopez Jose A. Montenegro Eiji Okamoto Ed Dawson

Different authorization schemes for Internet applications have been proposed during the last years as solutions for the distributed authorization problem. Because delegation is a concept derived from authorization, this paper studies and put into perspective the delegation implications, issues and concepts that are derived from a number of those authorization schemes. For our study, we have sel...

2016
Jason Crampton James Sellwood

Relationship-based access control (ReBAC) models define authorization policies and make authorization decisions on the basis of relationships between the entities in a system. We present a framework through which multiple ReBAC model instances can interoperate so that requests initiated in one system may target resources in a second system. Further, our framework is able to support requests pas...

2016
M Vijay Kumar M V N S D Kiran

Development of authorization mechanisms for secure information access by a big community of users in an unlock environment is a major trouble in the ever-growing Internet globe. In this paper we intend a computational dynamic trust model for user authorization, deep-rooted in findings from social science. Similar to most existing computational trust models, this model distinguishes trusting bel...

2009
Mingsheng Zhang Xinqiang Ma Mingyi Zhang

In access control, it is a reasonable requirement that authorization mechanism can be implemented intelligently by logic programs. We propose an authorization framework based on logic programs, ranging from design, analysis, and implementation. Our proposed framework is powerful and useful, with RBAC features, flexible authorization, logic-based formalization and integration of policies. It can...

2015

Prior Authorization Information Pre-service approval is required for all inpatient services for all products. See below for situations where prior authorization may be required or may not be required. Yes indicates that prior authorization is required. No indicates that prior authorization is not required. N/A indicates that this service is primarily performed in an inpatient setting. Outpatien...

Journal: :Tecnologica 1996

Prior Authorization Information Pre-service approval is required for all inpatient services for all products. See below for situations where prior authorization may be required or may not be required for outpatient services. Yes indicates that prior authorization is required. No indicates that prior authorization is not required. N/A indicates that this service is primarily performed in an inpa...

1998
Thomas Y. C. Woo Simon S. Lam

We present the design of a distributed authorization service which parallels existing authentication services for distributed systems. Such a service would operate on top of an authentication substrate. There are two distinct ideas underlying our design: (1) The use of a language, called generalized access control list (GACL), as a common representation of authorization requirements. (2) The us...

2008
Jason Crampton

Unix is an operating system that began development almost 40 years ago. It has a very simple mechanism for controlling access to protected resources based on the owner-group-world model. This simple model has not attracted much interest from the access control community. In this paper we argue that the Unix access control mechanism has some interesting features of relevance to modern authorizat...

ژورنال: حدیث پژوهی 2011

Experts in criticism and amendment have criticized some narrators of hadith because of some attributes, special moral traits or particular convictions. Belief in exaggeration and authorization is one of the factors which the narrators in earlier sources of transmitters of hadith have considered blameworthy. This phenomenon was widespread among the transmitters of the hadith of the Imams in th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید