Sciweavers

Share
WETICE
1997
IEEE

How Role Based Access Control is Implemented in SESAME

11 years 9 months ago
How Role Based Access Control is Implemented in SESAME
In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work was done in the framework of the EC-RACE project SESAME (A Secure European System in A Multivendor Environment). The SESAME project relies on the work done by ECMA (European Computer Manufacturers Association) to represent the credentials of the users and fully supports the GSS-API to help the application developers. We conclude that enforcing such a scheme is realistic and that writing applications, that benefit from the advantages of role based access control, is very feasible. We have built several demonstration applications.
Mark Vandenwauver, René Govaerts, Joos Vand
Added 06 Aug 2010
Updated 06 Aug 2010
Type Conference
Year 1997
Where WETICE
Authors Mark Vandenwauver, René Govaerts, Joos Vandewalle
Comments (0)
books