Meta-Data for Enterprise-Wide Security Administration

نویسندگان

  • W. Essmayr
  • R. R. Wagner
چکیده

The paper gives an overview on the meta-data specification for administrating and enforcing enterprisewide security for heterogeneous and distributed information systems. The meta-data serves as a basis to maintain enterprise-wide security information centrally, to integrate isolated security specifications, to keep the consistency between different security policies, and to perform access controls. The meta-data specifies all the information necessary for retaining the security concepts of an interoperable environment as well as all corresponding security information. Since several security systems have to be integrated within an interoperable environment the meta-data also contains the specification of mappings between security concepts and concrete security information.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Knowledge-based security administration in a distributed environment

The problem of computer security ha s recently become more prominent, especially with the growing interest in distributed systems . One major aspect is access control, especially to ensure that only those users who need to work with sensitive data are authorized to do so . A major drawback of most existing systems for security administration is the difficulty to enforce the compliance of a n ac...

متن کامل

Reflective Middleware and Security: OOPP meets Obol

The manner in which one can apply the security features of current middleware platforms, like Enterprise Java Beans and CORBA, are either too simple and limited or too complex and difficult to use. In both cases are the provided features static and do not support the flexibility needed in a wide range of applications. This paper presents an approach to flexible security mechanisms in the contex...

متن کامل

Security and Middleware

The security features of current middleware platforms, like Enterprise Java Beans and CORBA, are either simple and limited or complex and difficult to use. In both cases are the provided features static and do not support the flexibility needed in a wide range of applications. This paper introduces an approach to flexible security mechanisms in the context of a reflective middleware architectur...

متن کامل

Integrating ZyIMAGE with enterprise database management systems

This whitepaper presents a new application integration technology that is supported in ZyIMAGE 5.0 document management software. The technology is based on a plug-in architecture in which dynamic load modules can be developed that inject external document meta data in the ZyIMAGE search engine and document object model. First a short introduction to the object model is presented followed by a t...

متن کامل

Application Access Control using Enterprise Models

In this paper a framework for a model-driven control of identity management systems is presented. An important issue in today’s information systems security discussion addresses the effective authorisation of users. With established conceptual modelling languages the assignment of roles to the identity management software is an enormous organisational effort. To decrease administration costs we...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007