نتایج جستجو برای: authorization propagation

تعداد نتایج: 115609  

Journal: :Journal of the American College of Cardiology 2017

2012
Li-Yen Hsu

Regular degree-three Spider-Web networks, SW(m,n), are optimally, scalability prototyped along transportation paths as dual-surveillance − preventing information occlusion, or reliable identity based telecommunication networks. To promote network information transmission such as coping with radio interference and multipath effects, offering dynamic authentication / authorization the performance...

2011
Jeffy Mwakalinga

This paper describes a security system for authorization in open networks. Authorization means authority to access certain resources, to perform certain operations, or to use certain system functions. In this paper, the authorization system bases on use of attribute certificates. An attribute certificate is a signed object containing authorization attributes of a user. Before checking whether a...

Journal: :JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES 2019

2016
Prosunjit Biswas Ravi S. Sandhu Ram Krishnan

Logical formulas and enumeration are the two major ways for specifying authorization policies in Attribute Based Access Control (ABAC). While considerable research has been done for specifying logical-formula authorization policy ABAC, there has been less attention to enumerated authorization policy ABAC. This paper presents a finite attribute, finite domain ABAC model for enumerated authorizat...

2008
Steffen Bartsch Karsten Sohr Carsten Bormann

Custom SME applications for collaboration and workflow have become affordable when implemented as Web applications employing Agile methodologies. Security engineering is still difficult with Agile development, though: heavy-weight processes put the improvements of Agile development at risk. We propose Agile security engineering and increased end-user involvement to improve Agile development wit...

2005
Isaac Agudo Javier Lopez Jose A. Montenegro Eiji Okamoto Ed Dawson

Different authorization schemes for Internet applications have been proposed during the last years as solutions for the distributed authorization problem. Because delegation is a concept derived from authorization, this paper studies and put into perspective the delegation implications, issues and concepts that are derived from a number of those authorization schemes. For our study, we have sel...

2010
Pranab Kini

With the emergence of tighter corporate policies and government regulations, access control has become an integral part of business requirements in enterprises. The authorization process in enterprise systems follow the request-response model, where a policy enforcement point intercepts application requests, obtains authorization decisions from a remote policy decision point, and enforces those...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید