نتایج جستجو برای: authorization model
تعداد نتایج: 2110553 فیلتر نتایج به سال:
This paper presents an authorization scheme for large-scale networks that involves programming models and tools represented by Web, Java and CORBA. The authorization scheme is based on structures and concepts introduced in Web, Java and CORBA for security. A discretionary prototype is presented here, where the solutions adopted involving a concrete scheme are discussed. This scheme was develope...
We present a new model for authorization that integrates both local and distributed access control policies and that is extensible across applications and administrative domains. We introduce a general mechanism that is capable of implementing several security policies including role-based access control, Clark-Wilson, ACLs, capabilities, and lattice-based access controls. The Generic Authoriza...
Certificates have long been used to bind authorization information to an identity or public key. Essentially there are two ways in which a verifying authority (reference monitor) can obtain the information (from a certificate) that is required to make an access control decision: the requesting entity provides the privilege attributes to the verifying authority – a ‘push’ model; or the verifying...
OBJECTIVE To examine the impact of Medicaid prior authorization for atypical antipsychotics on the prevalence of schizophrenia among the prison population. Study DESIGN We collected drug-level information on prior authorization restrictions from Medicaid programs in 30 states to determine which states had prior authorization requirements before 2004. We linked the regulatory data to a survey ...
Access control between multi-user and multi-object is the key technique in security management of distributed workflow systems, and the mechanism of the role-based authorization and access control is an effective way to solve the problem. Both RBAC96 and NRBAC are better models of role-based access control. After introducing authorization constraints, a new model of role-based access control, A...
We present soundness and completeness theorems for our earlier work on modeling trust management systems. We then investigate the addition of distributed structured naming to the model, and prove that naming and authorization are orthogonal in a precise sense. The orthogonality theorem gives us soundness and completeness theorems for the entire system, in effect yielding a clean decomposition b...
Setting up secure application architecture is very challenging. The Service Oriented Architecture design allows and requires centrally manageable security services, among them the authorization service is the key to build model based security infrastructure. Although the theory of different security models are well-known, the definition and coding of the authorization rules are not complicated,...
BACKGROUND Genetic databases are becoming increasingly common as a means of determining the relationship between lifestyle, environmental exposures and genetic diseases. These databases rely on large numbers of research subjects contributing their genetic material to successfully explore the genetic basis of disease. However, as all possible research questions that can be posed of the data are ...
We present a trust management kernel that clearly separates authorization and structured distributed naming. Given an access request and supporting credentials, the kernel determines whether the request is authorized. We prove soundness and completeness of the authorization system without names and prove that naming is orthogonal to authorization in a precise sense. The orthogonality theorem gi...
Java 2 Security enhanced with the Java Authentication and Authorization Service (JAAS) provide sophisticated access control features via a user-configurable authorization policy. Fine-grained access control, code-based as well as user-based authorization, and implicit access rights allow the implementation of real-world policies, but of the cost of increased complexity. In this paper we provide...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید