250,491 Hits in 5.6 sec

Domain Based Access Control Model for Distributed Collaborative Applications

Yuri Demchenko, Cees Laat, Leon Gommans, Rene Buuren
2006 2006 Second IEEE International Conference on e-Science and Grid Computing (e-Science'06)  
This paper describes the design and development of a flexible domain-based access control infrastructure for distributed Collaborative Environments.  ...  The paper provides implementation details on the use of XACML for fine-grained access control policy definition for domain based resources and roles organisation.  ...  The papers [11, 12] proposes an extension of the generic RBAC model the usage control (UCON) based authorisation framework for collaborative application that specifically addresses access control to  ... 
doi:10.1109/e-science.2006.261108 dblp:conf/eScience/DemchenkoLGB06 fatcat:u2pifdwzfvaqvhqdsqjl4nclze

Extending Role Based Access Control Model for Distributed Multidomain Applications [chapter]

Yuri Demchenko, Leon Gommans, Cees de Laat
2007 IFIP International Federation for Information Processing  
This paper presents the results related to the development of a flexible domain-based access control infrastructure for distributed Grid-based Collaborative Environments and Complex Resource Provisioning  ...  It describes relations between the RBAC and the generic AAA access control models and defines combined RBAC-DM model for domain-based access control management and suggests mechanisms that can be used  ...  access control to distributed hierarchically organised resources in dynamic/on-demand services provisioning.  ... 
doi:10.1007/978-0-387-72367-9_26 fatcat:ltuvgu5kxjbshoymxrjwjm75um

A Framework for Managing Access of Large-Scale Distributed Resources in a Collaborative Platform

Su Chen, Tiejian Luo, Wei Liu, Jinliang Song, Feng Gao
2008 Data Science Journal  
In an e-Science environment, large-scale distributed resources in autonomous domains are aggregated by unified collaborative platforms to support scientific research across organizational boundaries.  ...  In order to enhance the scalability of access management, an integrated approach for decentralizing the task from resource owners to administrators on the platform is needed.  ...  XACML is an OASIS standard for access control. It provides a unified method and format for expressing access control elements' policy.  ... 
doi:10.2481/dsj.7.137 fatcat:sjscolwlurhrzdmzudiqqqzsmi

lightweight decentralized authorization model for inter-domain collaborations

Hannah K. Lee, Heiko Luedemann
2007 Proceedings of the 2007 ACM workshop on Secure web services - SWS '07  
In this paper, we propose a lightweight model using the concept of distributed roles from the dR-BAC model to bridge different domain boundaries.  ...  One of the major security challenges in modeling those inter-domain collaborations is providing a decentralized authorization solution.  ...  propose in [8] an access control model for distributed collaborative applications, which is an extension to the major service-oriented and Grid-based access generic framework such as Acegi, Globus Toolkit  ... 
doi:10.1145/1314418.1314431 dblp:conf/sws/LeeL07 fatcat:ge4p6hrogndjbf2k2yrys3essa

An Innovative Virtual Enterprise Approach to Agile Micro and SME-Based Collaboration Networks [chapter]

Tobias Münch, Robert Buchmann, Johannes Pfeffer, Patricia Ortiz, Conny Christl, Jan Hladik, Jens Ziegler, Oscar Lazaro, Dimitris Karagiannis, Leon Urbas
2013 IFIP Advances in Information and Communication Technology  
This paper demonstrates a lightweight and highly decentralized collaboration infrastructure approach for virtual enterprises and describes its added-value in the customer-oriented production domain.  ...  First, we will describe challenges and key requirements of an exemplary application scenario.  ...  The Web Layer of the server exposes a uniform interface for applications based on SPARQL [8] and provides an interface for enforcing access control policies.  ... 
doi:10.1007/978-3-642-40543-3_13 fatcat:zv2jqssb2va3vgdy2w6rn5pgpm

Agent-Based Semantic Role Mining for Intelligent Access Control in Multi-Domain Collaborative Applications of Smart Cities

Rubina Ghazal, Ahmad Kamran Malik, Basit Raza, Nauman Qadeer, Nafees Qamar, Sajal Bhatia
2021 Sensors  
We propose an Intelligent Role-based Access Control (I-RBAC) model that uses intelligent software agents for achieving intelligent access control in such highly dynamic multi-domain environments.  ...  Significance and popularity of Role-Based Access Control (RBAC) is inevitable; however, its application is highly challenging in multi-domain collaborative smart city environments.  ...  Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable. Data Availability Statement: The SOC dataset used in this study is available online [8].  ... 
doi:10.3390/s21134253 pmid:34206164 fatcat:tyiwvdahrngaban3zopi73y47m

Collaborative Access Control for Multi-Domain Cloud Computing

2012 IEICE transactions on information and systems  
In this paper, we present a new collaborative access control infrastructure for distributed cloud computing environment, supporting collaborative delegations across multiple domains in order to authorize  ...  For this purpose, we propose an extension of the XACML (eXtensible Access Control Markup Language) model with a new entity called Delegation Validation Point (DVP) to support multidomain delegation in  ...  for multi-domain cloud computing based on collaborative access control and delegations across multiple domains.  ... 
doi:10.1587/transinf.e95.d.2401 fatcat:g7t4c3kaqvgqzmae7lrsundfqi

Security Policies in Distributed CSCW and Workflow Systems

Tanvir Ahmed, Anand R. Tripathi
2010 IEEE transactions on systems, man and cybernetics. Part A. Systems and humans  
Research challenges of role based access control models for security policies in distributed CSCW and workflow systems are presented.  ...  Security models to specify and verify security requirements related to security attributes -namely, availability, integrity, confidentiality, and access leakage -are presented.  ...  For example, lattice based military access control models.  ... 
doi:10.1109/tsmca.2010.2046727 fatcat:ysjm5nn5hjeehpfa7k3xbmja64

Architecting Dependable Access Control Systems for Multi-domain Computing Environments [chapter]

Maciej P. Machulak, Simon E. Parkin, Aad van Moorsel
2009 Lecture Notes in Computer Science  
In this paper we present a requirements analysis for architecting dependable access control systems for multi-domain computing environments.  ...  In this paper we present a requirements analysis for architecting dependable access control systems for multidomain computing environments.  ...  The one presented in [44] proposes an XACML-based access control policy model for XACML policies and addresses the problem of rights delegation.  ... 
doi:10.1007/978-3-642-10248-6_3 fatcat:jaorrw2wv5eihjhqa4ppimvjya

Dynamic security context management in Grid-based applications

Yuri Demchenko, Olle Mulmo, Leon Gommans, Cees de Laat, Alfred Wan
2008 Future generations computer systems  
The paper analyses the general access control model for Grid based applications and discusses what mechanisms can be used for expressing and handling dynamic domain or process/workflow related security  ...  This paper summarises ongoing research and recent results on the development of flexible access control infrastructure for complex resource provisioning in Grid-based collaborative applications and on-demand  ...  The paper [7] proposed the domain-based resource management and access control models for a typical distributed Virtual Laboratory (VL) organisation and operation that includes factory facilities, VL  ... 
doi:10.1016/j.future.2007.07.015 fatcat:yurqfddjbvgyhg6k4igggwqwta

Architectural patterns for collaborative applications

Paris Avgeriou, Peter Tandler
2006 International journal of computer applications in technology  
We base these patterns on a number of well-established patterns in the domain of distributed applications, concentrating on the specific issues that are encountered in the domain of collaborative applications  ...  Though there are some application frameworks for this domain, they tend to be rather inflexible in the functionality they offer.  ...  As in collaborative applications client components implement the Views and Controllers that concurrently access a shared Model, an appropriate SYNCHRONISATION MODEL 3.6 needs to be established.  ... 
doi:10.1504/ijcat.2006.009062 fatcat:tzjxlbkxe5cwhbiaekwfnfampi

ComVantage: Mobile Enterprise Collaboration Reference Framework and Enablers for Future Internet Information Interoperability [chapter]

Angelika Salmen, Tobias Münch, Steffen Buzin, Jan Hladik, Werner Altmann, Conny Weber, Dimitris Karagiannis, Robert Buchmann, Jens Ziegler, Johannes Pfeffer, Markus Graube, Manuel Carnerero (+4 others)
2013 Lecture Notes in Computer Science  
However, the elaboration of collaborative business processes based on LD still needs to be properly formulated for FI systems.  ...  The aim of this paper is to present a reference architecture for mobile enterprise collaboration based on LD interoperability.  ...  Open Access.  ... 
doi:10.1007/978-3-642-38082-2_19 fatcat:tkrf7pq3j5eataezikrgeqkzcu

A security framework for dynamic collaborative working environments

Matthias Assel, Stefan Wesner, Alexander Kipp
2009 Identity in the Information Society  
In this paper the focus is how security concepts originating from the Grid domain have been applied for collaborative working environments.  ...  The chosen scenarios are a Virtual Laboratory for Infectious Diseases (ViroLab) and different collaborative environments from the engineering domain as defined within the CoSpaces project.  ...  Open Access This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction in any medium, provided  ... 
doi:10.1007/s12394-009-0027-1 fatcat:phlsobl65nazbbq64rtywvvjpm

Authorisation session management in on-demand resource provisioning in collaborative applications

Yuri Demchenko, Cees de Laat, Thierry Denys, Christian Toinard
2009 2009 International Symposium on Collaborative Technologies and Systems  
that may involve distributed resources and users from different administrative and security domains.  ...  Effective use of the resources in modern collaborative environment suggests their sharing between collaborating organisations and user groups and ondemand provisioning for the specific tasks and projects  ...  The authors believe that the proposed solutions for AuthZ session management in on-demand resource provisioning will provide a good basis for further discussion among CTS and networking specialists.  ... 
doi:10.1109/cts.2009.5067482 dblp:conf/cts/DemchenkoLDT09 fatcat:p6olqib2vnfshdem7qrat6bx7e

On Learning in Collective Self-Adaptive Systems: State of Practice and a 3D Framework

Mirko D'Angelo, Simos Gerasimou, Sona Ghahremani, Johannes Grohmann, Ingrid Nunes, Evangelos Pournaras, Sven Tomforde
2019 2019 IEEE/ACM 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)  
Finally, using example applications from this analysis, we derive open challenges and highlight the need for research on collaborative, resilient and privacy-aware mechanisms for CSAS.  ...  Based on this analysis, we introduce a 3D framework that illustrates the learning aspects of CSAS considering the dimensions of autonomy, knowledge access, and behaviour, and facilitates the selection  ...  Triggers for refining learnt models reveal a more balanced distribution that can be partitioned further into time-based and event-based triggers.  ... 
doi:10.1109/seams.2019.00012 dblp:conf/icse/DAngeloGGGNPT19 fatcat:ds2obxfq4ff7xejcdvi5tt2tkm
« Previous Showing results 1 — 15 out of 250,491 results