Role-Based Modelling of Interactions in Database Applications
نویسندگان
چکیده
Modern information systems interact with a wide variety of users ranging from people with specific roles in business processes to end-users who access information in various ways and in different environments. Therefore, an application has to adhere to a well defined security policy on one hand and be highly adaptable to context on the other. We have extended the OM data model, with its rich support for role modelling, with concepts for modelling interactions between users and applications. In this paper, we show how the resulting interaction model can be used for role-based access control, as well as for modelling interactions in context-aware applications.
منابع مشابه
A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing
Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification process. In this paper, we use the notion of trust as the basis of our probabilistic app...
متن کاملAN APPLICATION OF FUZZY NUMBERS TO THE ASSESSMENT OF MATHEMATICAL MODELLING SKILLS
In this paper we use the Triangular and Trapezoidal Fuzzy Numbers as tools for assessing student Mathematical Modelling (MM) skills. Fuzzy Numbers play a fundamental role in fuzzy mathematics analogous to the role played by the ordinary numbers in classical mathematics, On the other hand, MM appears today as a dynamic tool for teaching and learning mathematics, because it connects mathematics w...
متن کاملAnalysis of Molecular Interactions Using the Thermophoresis Method and its Applications in Neuroscience and Biological Processes
Introduction: Molecular interactions play an important role in the phenomenon and biological processes. In fact, any cellular biological process ranged from genetic replication to the production of various proteins to the transmission of neurological, hormonal, membrane involves collections of molecular interactions that occur continuously. Interference in each of these processes at every stage...
متن کاملCharacterizing the Validity and Real-World Utility of Health Technology Assessments in Healthcare: Future Directions; Comment on “Problems and Promises of Health Technologies: The Role of Early Health Economic Modelling”
With their article, Grutters et al raise an important question: What do successful health technology assessments (HTAs) look like, and what is their real-world utility in decision-making? While many HTAs are published in peer-reviewed journals, many are considered proprietary and their attributes remain confidential, limiting researchers’ ability to answer these questio...
متن کاملA hybrid approach for database intrusion detection at transaction and inter-transaction levels
Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...
متن کامل