Implementing Policies for Access Management
نویسندگان
چکیده
منابع مشابه
Implementing configuration management policies for distributed applications
The central purpose of this paper is to present a novel framework supporting the specification and the implementation of configuration management policies for distributed applications. The introduced approach is part of a system called PRISMA (A platform for integrated construction and management of distributed applications). It provides an integrated application development environment compris...
متن کاملFileWall: Implementing File Access Policies using Dynamic Access Context
FileWall is a file access control framework that allows file system administrators to enforce file access policies based on dynamic access context such as access history, environment, etc. Similar to a firewall, which interposes on a network path and operates on packets to enforce network access policies, FileWall interposes on a client-server path and operates on network file system messages t...
متن کاملFreeBSD Mandatory Access Control Usage for Implementing Enterprise Security Policies
Security needs of organizations are becoming more and more sophisticated nowadays. Most general-purpose operating systems (GPOS) provide access control policies to meet these needs. There are cases when the traditionally deployed Discretionary Access Control (DAC) rules are not sufficient: they tend to quickly become unmanageable in the case of large installations, and also are not enough for c...
متن کاملImplementing Real-Time Update of Access Control Policies
Real-time update of access control policies, that is, updating policies while they are in effect and enforcing the changes immediately, is necessary for many security-critical applications. In this paper, we consider real-time update of access control policies that arise in a database system. Updating policy while they are in-effect can lead to potential security problems. In an earlier work, w...
متن کاملManagement of Exceptions on Access Control Policies
The use of languages based on positive or negative expressiveness is very common for the deployment of security policies (i.e., deployment of permissions and prohibitions on firewalls through singlehanded positive or negative condition attributes). Although these languages may allow us to specify any policy, the single use of positive or negative statements alone leads to complex configurations...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: D-Lib Magazine
سال: 1998
ISSN: 1082-9873
DOI: 10.1045/february98-arms