نتایج جستجو برای: authorization model
تعداد نتایج: 2110553 فیلتر نتایج به سال:
Many organizations struggle with ineffective and/or inefficient access control, but these problems and their consequences often remain invisible to security decision-makers. Prior research has focused on improving the policy-authoring part of authorization and does not show the full range of problems, their impact on organizations, and underlying causes. We present a study of 118 individual's e...
The validation of enterprise authorization specification for conformance to enterprise security policies requires an out-of-band framework in many situations since the enforcing access control mechanism does not provide this feature. In this paper we describe one such framework. The framework uses XML to encode the enterprise authorization specification, XML Schema to specify the underlying acc...
In this tutorial, we present an authorization model for distributed systems that operate with limited internet connectivity. Reliable internet access remains a luxury for a majority of the world’s population. Even for those who can afford it, a dependence on internet connectivity may lead to sub-optimal user experiences. With a focus on decentralized deployment, we present an authorization mode...
This paper describes efforts underway within Internet2 to create a secure federated IP based videoconferencing model. The objective is to create an environment that is user-friendly, ensures user privacy, and simplifies user management. This model makes use of the Session Initiation Protocol (SIP) as the underlying session establishment protocol. Since the session can (and most often will) be b...
We present algorithms for access rights control in multiuser, object-oriented databases. These algorithms follow the model of authorization introduced in 6]. We show how the three basic operations: AccessControl, Grant, and Revoke can be eeciently implemented using techniques for manipulating partially ordered sets. Several techniques for maintenance of authorization bases are presented and the...
BACKGROUND An increase in prior authorization (PA) requirements from health insurance companies is placing administrative and financial burdens on primary care offices across the United States. As time allocation for these cases continues to grow, physicians are concerned with additional workload and inefficiency in the workplace. The objective is to estimate the effects of practice characteris...
Current credit card authorization was developed on single-threaded model whereby authentication process takes longer time to respond due to sequential process of card’s risk management profile and its limitation of handling huge number of simultaneous transactions at single point of time. As a result, the performance of the authorization system was affected during peak hours. This study present...
The title of the thesis contains words strongly distributed systems1. This means information systems that are able to process tasks that may be distributed not only in space, but also in time. What we are going to discuss are problems related to processing tasks with long time durability those processing is performed in multiple information systems with their own administration. More and more o...
Since its initial development Kerberos has evolved to become the widely accepted system for implementing centralized authentication services. During this time the Lightweight Directory Access Protocol (LDAP) has become the accepted method for the centralized distribution of identity information. Organizations increasingly deploy both infra-structural components in order to support management of...
We discuss the design of an integrated security architecture for authorization and authentication in a distributed object environment. Our architecture will have four main components: an authentication engine, an interface, a session manager and an authorization engine. The core component of our model is the session manager, which issues XML-based session certificates to authenticated users. A ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید