نتایج جستجو برای: authorization

تعداد نتایج: 8242  

2007
Wei Zhou Christoph Meinel

In order to manage and enforce multiple heterogeneous authorization policies in distributed authorization environment, we defined the root policy specification language and its corresponding enforcing mechanism. In a root policy, the involved users and resources can be defined in coarse or finegrained. Each involved authorization policy’s storage, trust management and enforcement can be defined...

2015
Owen Arden Jed Liu Andrew C. Myers

Because information flow control mechanisms often rely on an underlying authorization mechanism, their security guarantees can be subverted by weaknesses in authorization. Conversely, the security of authorization can be subverted by information flows that leak information or that influence how authority is delegated between principals. We argue that interactions between information flow and au...

2015
Pranab Das Abhinav Das David F Ferraiolo Ravi Sandhu Serban Gavrila D Richard Kuhn Eric Yuan Jin Tong Shucheng Yu Cong Wang Kui Ren Wenjing Lou Martin Gaedke Johannes Meinecke Martin Nussbaumer Markus Lorch Seth Proctor Rebekah Lepro Dennis Kafura Sumit Shah Nurzhan Nurseitov Michael Paulson Randall Reynolds Paulo Trezentos Jaehong Park Erich Gamma Richard Helm Ralph Johnson

Absence of architecture to describe how to implement authorization as a centralized service, in a way similar to authentication , has been causing redundant deployment of computing resources, lack of standard practices, and never-ending learning curve in maintaining proprietary or ad hoc authorization solutions. The paper develops an architecture, which focuses on centralization of authorizatio...

2012
Jinwei Hu Khaled M. Khan Yun Bai Yan Zhang

Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. In this paper, we study a notion of authorization provenance, based on a recently proposed logic in the literature. By examining a collection of properties, we show this defini...

2001
Ramaswamy Chandramouli

In most of the current authorization frameworks in application systems, the authorization for a user operation is determined using a static database like ACL entries or system tables. These frameworks cannot provide the foundation for supporting multiple types of authorizations like Emergency Authorizations, Context-based Authorizations etc, which are required in many vertical market systems li...

2003
Rebekah Lepro

Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functio...

2007
Jiangnan Qiu Jiang Tian Yanzhang Wang

Firstly considering the problems in e-government authorization model, we analyze the features of government business process. Then an innerorganization authorization model based on organization is proposed. Then based on the proposed model, an authorization model for inter-organizational business process collaboration is designed. This model can resolve the problem of separating organization an...

2004
Wu Liu Jianping Wu Hai-Xin Duan Xing Li Ping Ren

This paper presents an authorization solution for resource management and control developing as a part of the China Education and Research Network (CERNET) to perform fine-grained authorization of job and resource management requested in the Grid environment which meets the Fusion-Grid’s security needs in large scale networks such as CERNET. It integrates the GT2 job manager and X.509 authoriza...

1993
Simon S. Lam

In most existing systems, authorization is speciied using some low-level system-speciic mechanisms, e.g., protection bits, capabilities and access control lists. We argue that authorization is an independent semantic concept that must be separated from implementation mechanisms and given a precise semantics. We propose a logical approach to representing and evaluating authorization. Speciically...

2005
Jiageng Li

Grid computing has received widespread attention in recent years as a significant new research field. Yet to date, there has been only a limited work on the grid system authorization problem. In this paper, we address the authorization problem and its requirements in a grid system environment. We propose a new integrated authorization service that tackles the authorization problem at two levels...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید