نتایج جستجو برای: authorization propagation

تعداد نتایج: 115609  

Journal: :Data Knowl. Eng. 2000
Renate Motschnig

Large information bases that are used by several different users and applications accommodate the demands of their users more effectively, if they can be split into possibly overlapping fragments, called contexts. The latter allow one to focus attention on specific concerns such as topics, tasks, or user-views. This paper proposes a conceptual, generic framework for contexts supporting context-...

Journal: :TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES 2016

Journal: :IEEE Transactions on Parallel and Distributed Systems 2013

Journal: :JACC: Clinical Electrophysiology 2020

1991
Ravi S. Sandhu Gurpreet S. Suri

The Transform access-control model is based on the concept of transformation of access rights. It has previously been shown that Transform uni es a number of diverse access control mechanisms such as ampli cation, copy ags, separation of duties and synergistic authorization. It has also been shown that Transform has an e cient algorithm for safety analysis of the propagation of access rights (i...

2005
SANDEEP KUMAR SINGH

This paper proposes an Authorization-Pull support for Community Authorization Services (CAS), an authorization-push model for the Grid authorization by the Globus Alliance, to evaluate it in the role of a pull model. The proposed system tries to evaluate the advantages and use of an authorization-pull model in the grid scenario making use of CAS and compares the same with the push-model origina...

Journal: :Computers & Security 1993
Ravi S. Sandhu Gurpreet S. Suri

The Transform model is based on the concept of transformation of access rights. It unifies a number of diverse acccsscontrol mechanisms such as amplification, copy flags, separation of duties and synergistic authorization. In this paper we describe a distributed architecture for implementing Transform. Our architecture is based on capabilities with identities of subjects buried in them. This en...

1998
G. Fisher

26 In this paper, we have omitted discussion of many of the more practical details due to length limitation. For example, the problems of consistency (due to cache invalidation and certiicate expiration), group membership maintenance and propagation of authorization must be addressed in an implementation. A prototype implementation of our design is currently under way. We have nished implementi...

2015
Silvia Ghilezan Svetlana Jaksic Jovanka Pantovic Jorge A. Pérez Hugo Torres Vieira

Security requirements in distributed software systems are inherently dynamic. In the case of authorization policies, resources are meant to be accessed only by authorized parties, but the authorization to access a resource may be dynamically granted/yielded. We describe ongoing work on a model for specifying communication and dynamic authorization handling. We build upon the π-calculus so as to...

Journal: :Journal of Information Processing 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید