A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
RBAC-Based Secure Interoperation Using Constraint Logic Programming
2009
2009 International Conference on Computational Science and Engineering
Secure interoperation is an increasingly important issue for large-scale enterprise applications. In this paper, we investigate, through constraint logic programming (CLP), secure interoperation in collaborating environments which employ Role-Based Access Control (RBAC) policies. In particular, we propose two types of interoperation, permission-based and the role-based secure interoperation, both formulated in CLP. Since a wide range of conflicts that may arise during interoperation, we also
doi:10.1109/cse.2009.249
dblp:conf/cse/HuLL09
fatcat:fntm2ucptbfqbcriid4pno5ql4