Filters








711,385 Hits in 5.5 sec

Role-based security for distributed object systems

N. Yialelis, E. Lupu, M. Sloman
Proceedings of WET ICE '96. IEEE 5th Workshop on Enabling Technologies; Infrastucture for Collaborative Enterprises  
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, rrzulti-organisational enterprise in which domains are used to  ...  group objects for specifying security policies.  ...  Conclusion We have given an overview of an access control model for distributed object systems and a security architecture that is being developed in the CORBA distributed programming environment.  ... 
doi:10.1109/enabl.1996.555078 dblp:conf/wetice/YialelisLS96 fatcat:afmvitua65fchic3g7pr5itmhi

MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems

Na Zhao, Min Chen, Shu-Ching Chen, Mei-Ling Shyu
2008 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC)  
security control requirements of the distributed multimedia applications.  ...  The object-oriented concept is adopted in MRBAC to perform the hybrid role hierarchy management and security roles and rules administration.  ...  Related Work Role-Based Access Control (RBAC) is a security solution to restricting system access to authorized users.  ... 
doi:10.1109/isorc.2008.41 dblp:conf/isorc/ZhaoCCS08 fatcat:k6otxptezfbhxco7k77adzmxjq

Architectural Separation of Authorization and Application Logic in Distributed Systems

Konstantin Beznosov
2005 Zenodo  
The same approach might be generalized and applied for other security properties of distributed application systems.  ...  and software security under an architecture-centered approach for system composition.  ...  Hauck, "Meta Objects for Access Control: A Formal Model for Role-based Principals," New Security Paradigms Workshop, 1998.  ... 
doi:10.5281/zenodo.3264090 fatcat:traautbfl5fq5bo5rr3aawlame

Programmable Security for Object-Oriented Systems [chapter]

John Hale, Mauricio Papa, Sujeet Shenoi
1999 Database Security XII  
This paper focuses on "programmable security" for object-oriented systems and languages.  ...  This model can be used to construct virtually any distributed object language or system while supporting a spectrum of decentralized authorization models. S. Jajodia (ed.), Database Security XII  ...  This paper illustrates programmable security for object systems using security mechanisms embedded in a primitive distributed object model.  ... 
doi:10.1007/978-0-387-35564-1_7 fatcat:xyhnjb3q6bbv3ohtlna4yba3ae

Security Policies in Distributed CSCW and Workflow Systems

Tanvir Ahmed, Anand R. Tripathi
2010 IEEE transactions on systems, man and cybernetics. Part A. Systems and humans  
Research challenges of role based access control models for security policies in distributed CSCW and workflow systems are presented.  ...  Unique security requirements for these systems are also discussed.  ...  In distributed systems [60] , role is viewed a certified capabilities for authorizing access to services.  ... 
doi:10.1109/tsmca.2010.2046727 fatcat:ysjm5nn5hjeehpfa7k3xbmja64

Role-based access control in DCOM

Gail-Joon Ahn
2000 Journal of systems architecture  
And we investigate how we can enforce the role-based access control as a security provider within DCOM, specially in access security policy. Ó  ...  Also, we describe the concept of role-based access control (RBAC) which began with multi-user and multi-application on-line systems pioneered in the 1970s.  ...  The concept of role-based access control (RBAC) began with multi-user and multi-application on-line systems pioneered in the 1970s.  ... 
doi:10.1016/s1383-7621(00)00017-5 fatcat:nqpcuntfs5gxdibxj4pcgaaafe

Modeling and design of role engineering in development of access control for dynamic information systems

A. Poniszewska-Marańda
2013 Bulletin of the Polish Academy of Sciences: Technical Sciences  
systems, based on the role concept and the usage concept.  ...  The paper presents the modeling and design stages in the process of role engineering in the aspect of security schema development for information systems, in particular for dynamic, distributed information  ...  The paper presents the modeling and design stages in the process of role engineering in the aspect of security schema development for information systems, in particular for dynamic, distributed information  ... 
doi:10.2478/bpasts-2013-0058 fatcat:wdf65y6vrng57ng2lkbf6jmuja

Security and Digital Libraries [chapter]

Edward Fox, Noha ElSherbiny
2011 Digital Libraries - Methods and Applications  
., 2003) , for use in distributed systems. Role management in OASIS is decentralized and service specific.  ...  Content based access control policies are very well suited for digital libraries and distributed systems.  ...  This chapter is distributed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike-3.0 License, which permits use, distribution and reproduction for non-commercial purposes, provided  ... 
doi:10.5772/15762 fatcat:wzanvrj3mnc2hpdnkocxg3ipeq

Access Control, Reverse Access Control and Replication Control in a World Wide Distributed System [chapter]

Bogdan C. Popescu, Chandana Gamage, Andrew S. Tanenbaum
2002 IFIP Advances in Information and Communication Technology  
Finally, there is the issue of how updates are propagated securely from replica to replica. Our solution uses roles and preserves the scalability needed in a world-wide distributed system.  ...  In this paper we examine several access control problems that occur in an objectbased distributed system that permits objects to be replicated on multiple machines.  ...  Globe [14] , is a wide-area distributed system based on distributed shared objects (OSO).  ... 
doi:10.1007/978-0-387-35612-9_12 fatcat:2jocf5w6rngfvb2c7arwjoly2m

Security Authorization Scheme for Web Applications

Takamichi Saito, Daichi Miyata, Takafumi Watanabe, Yuta Nishikura
2015 2015 18th International Conference on Network-Based Information Systems  
Authorization failure can create much vulnerability for the system security using web services which are distributed in nature.  ...  In this paper a survey of the authorization techniques for web services based application.  ...  Many security vulnerabilities' can be avoided by proper authorization and secure access controlling. Most of the proposed systems are doing authorization based on the role based model.  ... 
doi:10.1109/nbis.2015.40 dblp:conf/nbis/SaitoMWN15 fatcat:akaefui4crbnha6ebvpni7tlcu

Dynamically authorized role-based access control for secure distributed computation

C. Joncheng Kuo, Polar Humenn
2002 Proceedings of the 2002 ACM workshop on XML security -  
authorized Role-Based Access Control (RBAC) for a secure distributed computation system.  ...  This approach gives the mechanism by which we can secure our CORBA based distributed computation system.  ...  In securing the system the need for role-based access control (RBAC) [5] became evident because the components of the system are configured dynamically in specific neighbor relationships to each other  ... 
doi:10.1145/764804.764807 fatcat:rtf7wbnrrbftpmeg532jyzsqxy

Dynamically authorized role-based access control for secure distributed computation

C. Joncheng Kuo, Polar Humenn
2002 Proceedings of the 2002 ACM workshop on XML security - XMLSEC '02  
authorized Role-Based Access Control (RBAC) for a secure distributed computation system.  ...  This approach gives the mechanism by which we can secure our CORBA based distributed computation system.  ...  In securing the system the need for role-based access control (RBAC) [5] became evident because the components of the system are configured dynamically in specific neighbor relationships to each other  ... 
doi:10.1145/764792.764807 dblp:conf/xmlsec/KuoH02 fatcat:apsrfdvw7va2zmvihcb6c7hmou

Analysis of Different Access Control Mechanism in Cloud

Punithasurya K, Jeba Priya S
2012 International Journal of Applied Information Systems  
Providing security to the data stored in cloud is the major concern. So Security can be enhanced by providing access control to the authorized users.  ...  ABAC: Attribute Access Control dRBAC (distributed RBAC) dRBAC is distributed role based access control which supports large distributed system.  ...  In the earlier there was various access control mechanisms has been introduced for the secure data access. Access control relies on the security of the system and gives the access to the object.  ... 
doi:10.5120/ijais12-450660 fatcat:cxqpx4fg5jhfnnpqkrkkhwoply

Security Engineering for Large Scale Distributed Applications

Konstantin Beznosov
2005 Zenodo  
Drawing on my academic and industrial experiences, I will discuss several recently invented techniques that can improve engineering of security mechanisms for distributed systems.  ...  The way security mechanisms for large-scale distributed applications are engineered today has a number of serious drawbacks.  ...  Barkley, "A Resource Access Decision Service for CORBA-based Distributed Systems," Annual Computer Security Applications Conference (ACSAC), Phoenix, Arizona, USA, 1999.  ... 
doi:10.5281/zenodo.3264195 fatcat:uoxeem3twva4nctxekieuj7dzu

Security models for web-based applications

James B. D. Joshi, Walid G. Aref, Arif Ghafoor, Eugene H. Spafford
2001 Communications of the ACM  
The strong need for information security on the Internet is attributable to several factors, including the massive interconnection of heterogeneous and distributed systems, the availability of high volumes  ...  largescale distributed applications.  ...  Hypertext-based authorization models are essential for secure composition and distribution of complex Web documents.  ... 
doi:10.1145/359205.359224 fatcat:vsa4ca3kabfvzeve6zp7kkg2ze
« Previous Showing results 1 — 15 out of 711,385 results