Implementing Policies for Access Management

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementing configuration management policies for distributed applications

The central purpose of this paper is to present a novel framework supporting the specification and the implementation of configuration management policies for distributed applications. The introduced approach is part of a system called PRISMA (A platform for integrated construction and management of distributed applications). It provides an integrated application development environment compris...

متن کامل

FileWall: Implementing File Access Policies using Dynamic Access Context

FileWall is a file access control framework that allows file system administrators to enforce file access policies based on dynamic access context such as access history, environment, etc. Similar to a firewall, which interposes on a network path and operates on packets to enforce network access policies, FileWall interposes on a client-server path and operates on network file system messages t...

متن کامل

FreeBSD Mandatory Access Control Usage for Implementing Enterprise Security Policies

Security needs of organizations are becoming more and more sophisticated nowadays. Most general-purpose operating systems (GPOS) provide access control policies to meet these needs. There are cases when the traditionally deployed Discretionary Access Control (DAC) rules are not sufficient: they tend to quickly become unmanageable in the case of large installations, and also are not enough for c...

متن کامل

Implementing Real-Time Update of Access Control Policies

Real-time update of access control policies, that is, updating policies while they are in effect and enforcing the changes immediately, is necessary for many security-critical applications. In this paper, we consider real-time update of access control policies that arise in a database system. Updating policy while they are in-effect can lead to potential security problems. In an earlier work, w...

متن کامل

Management of Exceptions on Access Control Policies

The use of languages based on positive or negative expressiveness is very common for the deployment of security policies (i.e., deployment of permissions and prohibitions on firewalls through singlehanded positive or negative condition attributes). Although these languages may allow us to specify any policy, the single use of positive or negative statements alone leads to complex configurations...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: D-Lib Magazine

سال: 1998

ISSN: 1082-9873

DOI: 10.1045/february98-arms