نتایج جستجو برای: authorization

تعداد نتایج: 8242  

2011
Michael Backes Matteo Maffei Kim Pecina

We introduce a framework for the automated synthesis of security-sensitive distributed applications. The central idea is to provide the programmer with a high-level declarative language for specifying the system and the intended security properties, abstracting away from any cryptographic details. A compiler takes as input such high-level specifications and automatically produces the correspond...

2005
Sarath Indrakanti Vijay Varadharajan Michael Hitchens

While there are several efforts underway to provide security for the Service Oriented Architecture (SOA), there is no specification or standard defined to provide authorization services for the SOA. The SOA comprises of Web services and business process workflows built using Web services. Based on our analysis of existing authorization frameworks and policy specification models for the SOA, we ...

Journal: :JSW 2013
Zhaofeng Ma Jianqing Huang Yixian Yang Xinxin Niu

With fast development of network computing and storage technologies, it became more and more convenient to share and spread digital resources through kinds of network services, however without protection and constraint of copyright, digital content can be illegally copied, altered and distributed, which could cause revenue loss to commercial digital resource providers, to solve this problem, di...

2015
Divya Muthukumaran Nirupama Talele Trent Jaeger Gang Tan

Many security-sensitive programs manage resources on behalf of mutually distrusting clients. To control access to resources, authorization hooks are placed before operations on those resources. Moreover, manual hook placements by programmers are often incomplete or incorrect, leading to insecure programs. We advocate an approach that automatically identifies the set of program locations to plac...

Journal: :IET Information Security 2010
Jose M. Alcaraz Calero Gregorio Martínez Pérez Antonio F. Gómez-Skarmeta

Authorization is a crucial process in current information systems. Nowadays, many of the current authorization systems do not provide methods to describe the semantics of the underlying information model which they are protecting. This fact can lead to mismatch problems between the semantics of the authorization model and the semantics of the underlying data and resources being protected. In or...

Journal: :Future Generation Comp. Syst. 2017
Cheng Chang Ligang He Nadeem Chaudhary Songling Fu Hao Chen Jianhua Sun Kenli Li Zhangjie Fu Ming-Liang Xu

Many workflow management systems have been developed to enhance the performance of workflow executions. The authorization policies deployed in the system may restrict the task executions. The common authorization constraints include role constraints, Separation of Duty (SoD), Binding of Duty (BoD) and temporal constraints. This paper presents the methods to check the feasibility of these constr...

2011
G Garzoglio J Gu T Hesselroth O Koeroo T Levshina S Martin M Salle N Sharma A Sim S Timm A Verstegen

The Authorization Interoperability activity was initiated in 2006 to foster interoperability between middleware and authorization infrastructures deployed in the Open Science Grid (OSG) and the Enabling Grids for E-sciencE (EGEE) projects. This activity delivered a common authorization protocol and a set of libraries that implement that protocol. In addition, a set of the most common Grid gatew...

Journal: :JCS 2014
Maizura Ibrahim Hamidah Ibrahim Azizol Abdullah Rohaya Latip

Grid computing is a system that coordinates distributed resources using standards, open, general purpose protocols and interfaces to provide nontrivial quality of services. Usage Control model (UCON) is a new emerging authorization framework that combined features of traditional access control, trust management and digital right management in one abstraction. Adoption of UCON improved the fine-...

2005
Jong P. Yoon

One of the important tasks of managing eXtensible Markup Language (XML) documents is to uniformly specify and securely maintain both target documents and authorization policies. However‚ since existing techniques decouple access authorization from query processing‚ the query processing time with access control is not satisfactorily fast. The access control requires the overhead in addition to t...

Journal: :The American journal of managed care 2014
Dana Goldman John Fastenau Riad Dirani Eric Helland Geoff Joyce Ryan Conrad Darius Lakdawalla

OBJECTIVE To examine the impact of Medicaid prior authorization for atypical antipsychotics on the prevalence of schizophrenia among the prison population. Study DESIGN We collected drug-level information on prior authorization restrictions from Medicaid programs in 30 states to determine which states had prior authorization requirements before 2004. We linked the regulatory data to a survey ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید