نتایج جستجو برای: access control policies
تعداد نتایج: 1702974 فیلتر نتایج به سال:
Modelling is a proven technique to communicate and illustrate complex specifications in a wide range of disciplines. Access control (AC) specification is not an exception in this regard. Actually, it is characterized by the sensitivity and criticality of its contents where clarity and formalism are yet essential desired goals. In a metamodelling approach where textual languages and visual model...
Access control policies are security policies that govern access to resources. The need for real-time update of such policies while they are in effect and enforcing the changes immediately, arise in many scenarios. Consider, for example, a military environment responding to an international crisis, such as a war. In such situations, countries change strategies necessitating a change of policies...
Modern operating systems each have different implementations of access controls and use different policies for determining the access that subjects may have on objects. This paper reviews the three main types of access control policies: discretionary, mandatory, and role-based. It then describes how Windows and various Unix systems implement their chosen access control policies. Finally, it dis...
We examine the problem of negotiating access control policies between autonomous domains. Our objective is to develop software agents that can automatically negotiate access control policies between autonomous domains with minimal human guidance. In this paper we show a mathematical framework that is capable of expressing many such negotiation problems, and illustrate its application to some pr...
Managing the evolution of a dynamic virtual organisation (VO) is a considerable challenge, particularly in ensuring that participating agents provide sufficient access to resources in order to achieve the overall goals without compromising their own information management principles. We propose a tool-supported approach, based on executable formal models, that supports rapid visualised feedback...
From a software design perspective, access control policies are requirements that must be addressed in a design. For example, access control policies are constraints that determine the type of access authorized users have on information resources. In this paper, we show how one can formulate access control policies as a policy model, formulate an access control aspect model that enforces polici...
A field access analysis computes for each object the set of places where its fields are accessed and modified. Such an analysis is the formal basis for a code instrumentation algorithm that inserts access control checks in a program to enforce an access control policy. The present work formalizes field access analysis in terms of a typebased program analysis for Java, proves type preservation f...
Role-Based Access Control (RBAC) has been widely used in information systems, including so-called critical systems. In business, workflows are to control the flow of processes. One major issues concerning these processes is be able verify that a proposed process model strictly corresponds specifications which it supposed respond. models describe frameworks dictate permissions. The RBAC generall...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید