Methodologies for Access Control and their Interactions

نویسندگان

  • Anshula Garg
  • Anshula GARG
  • Pradeep Mishra
چکیده

We propose the use of process-based access-control methods in the construction of privacy systems in the present paper. Segregation of duties and least privilege are two key business principles that protect an organization’s valuable data and resources from deliberate or accidental information leak, or data corruption by staff. As a substantial amount of this information is stored on computer systems then control over computer access represents a major security component through its implementation of the key business

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Method integration: An approach to develop agent oriented methodologies

Agent oriented software engineering (AOSE) is an emerging field in computer science  and  proposes some systematic ideas for multi agent systems analysis, implementation and maintenance. Despite the various methodologies introduced in the agent-oriented software engineering, the main challenges are defects in different aspects of methodologies. According to the defects resulted from weaknesses ...

متن کامل

A combination of semantic and attribute-based access control model for virtual organizations

A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...

متن کامل

بررسی وضعیت پایگاه اطلاعات آنتروپومتریک در ایران : مطالعه مروری

Background and aims: Access to an Anthropometric database is essential for human-centered design. Several Iranian researchers preceded their studies with the aim of collecting useful data for designing workstations. The present study aims to review all of these related studies in order to introduce the state of the art and help to clarify future studies.  Methods: Databanks of Google sc...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

A model for specification, composition and verification of access control policies and its application to web services

Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012