نتایج جستجو برای: access control policy acp

تعداد نتایج: 1825945  

2007
G. Lenzini

In this paper we introduce a new framework for controlling compliance to discretionary access control policies [9,11]. The framework consists of a simple policy language, modeling ownership of data and administrative policies. Users can create documents, and authorize others to process the documents. To control compliance to the document policies, we define a formal audit procedure by which use...

2012
Neera Batra Hemant Aggarwal

The rapid growth of information technology and networking expands the business globally. All the data related to business is stored and managed in centralized or distributed manner. Database provides inbuilt security to manage different levels of data but if we apply overall security from accessing the different levels of user’s data to different levels of users, it will increase implementation...

2000
Tatyana Ryutov Clifford Neuman

We present a new model for authorization that integrates both local and distributed access control policies and that is extensible across applications and administrative domains. We introduce a general mechanism that is capable of implementing several security policies including role-based access control, Clark-Wilson, ACLs, capabilities, and lattice-based access controls. The Generic Authoriza...

2000
Paul C. Clark

Graduates from the various computer fields need to have a better education in the area of computer security problems and their solutions. In particular, there appears to be little exposure to the enforcement of non-discretionary or Mandatory Access Control (MAC) policies in automated systems. One cause of this deficiency is the expense, limited availability, and limited functionality of operati...

Journal: :CoRR 2012
Abdelmajid Lakbabi Ghizlane Orhanou Said El Hajji

Traditional products working independently are no longer sufficient, since threats are continually gaining in complexity, diversity and performance; In order to proactively block such threats we need more integrated information security solution. To achieve this objective, we will analyze a real-world security platform, and focus on some key components Like, NAC, Firewall, and IPS/IDS then stud...

Journal: :Australian dental journal 2003
F Cai P Shen M V Morgan E C Reynolds

BACKGROUND The anticariogenic potential of casein phosphopeptide-amorphous calcium phosphate nanocomplexes (CPP-ACP) has been demonstrated using laboratory, animal and human in situ caries models. The aim of this study was to determine the effect of CPP-ACP incorporation into a sugar-free lozenge (pressed mint tablet) on enamel remineralization in a human in situ model. METHODS The study util...

2000
Venkata Bhamidipati Ravi Sandhu

The basic concept of role-based access control (RBAC) is that permissions are associated with roles and users are made members of appropriate roles thereby acquiring the roles' permissions. Using RBAC to manage RBAC provides additional convenience. The administration of RBAC can be divided into three main categories namely, user-role assignment, permission-role assignment and role-role assignme...

2011
Amanda Crowell

Modern operating systems each have different implementations of access controls and use different policies for determining the access that subjects may have on objects. This paper reviews the three main types of access control policies: discretionary, mandatory, and role-based. It then describes how Windows and various Unix systems implement their chosen access control policies. Finally, it dis...

2007
Michael A. Smith Andrew Schain Kendall Clark Arlen Griffey Vladimir Kolovski

Among the challenges of managing NASA’s information systems is the management (that is, creation, coordination, verification, validation, and enforcement) of many different role-based access control policies and mechanisms. This paper describes an actual data federation use case that demonstrates the inefficiencies created by this challenge and presents an approach to reducing these inefficienc...

2005
Hyung Chan Kim R. S. Ramakrishna Kouichi Sakurai Wook Shin

The increasing development of distributed application has led to the widespread involvement of database interconnection. Information sharing through the interconnection requires a new type of access control beyond local-only access control scheme: we need to consider the relationship among organizations and a collaborative application. In this paper, we describe an access control framework for ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید