Sciweavers

51 search results - page 1 / 11
» Use of Roles and Policies for Specifying and Managing a Virt...
Sort
View
RIDE
1999
IEEE
13 years 8 months ago
Use of Roles and Policies for Specifying and Managing a Virtual Enterprise
One of the problems faced by an organisation participating in a virtual enterprise is how to specify internal and external aspects of the organisation in terms of the organisation...
Emil Lupu, Zoran Milosevic, Morris Sloman
CCS
2008
ACM
13 years 6 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
EDOC
1997
IEEE
13 years 8 months ago
A Policy Based Role Object Model
Enterprise roles define the duties and responsibilities of the individuals which are assigned to them. This paper introduces a framework for the management of large distributed sy...
Emil Lupu, Morris Sloman
POLICY
2001
Springer
13 years 8 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
ICSE
2007
IEEE-ACM
14 years 4 months ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...