A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
Secure interoperation is an increasingly important issue for large-scale enterprise applications. In this paper, we investigate, through constraint logic programming (CLP), secure interoperation in collaborating environments which employ Role-Based Access Control (RBAC) policies. In particular, we propose two types of interoperation, permission-based and the role-based secure interoperation, both formulated in CLP. Since a wide range of conflicts that may arise during interoperation, we alsodoi:10.1109/cse.2009.249 dblp:conf/cse/HuLL09 fatcat:fntm2ucptbfqbcriid4pno5ql4