This paper makes two main contributions towards estab-lishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification framework for reasoning about the architecture of the security mechanisms in distributed applications that follow the deci-sion-enforcement paradigm of the reference monitor. It uses the framework to show that the existing solutions lack satisfy-ing trade-offs for a wide range of those applications that require application-specific factors to be used in security decisions while mediating access requests. Second, by introducing attribute function in addition to decision and enforcement ones, it proposes a novel scheme for clean separation among suppliers of middle...
Middleware is referred to as computer software that can connect various software components or appli...
State-of-the-art security mechanisms are often enforced in isolation from each other, which limits t...
Specifying and managing access control policies for large distributed systems is a non-trivial task....
This paper makes two primary contributions toward establishing support for application-specific fact...
Security is an essential feature and foremost concern to Internet and enterprise distributed softwar...
Security is an essential feature and foremost concern to enterprise software systems. Today, applica...
The way security mechanisms for large-scale distributed applications are engineered today has a numb...
Access control (AC) is a necessary defense against a large variety of security attacks on the resour...
Access control (AC) is a necessary defense against a large variety of security attacks on the resour...
Decoupling authorization logic from application logic allows applications with fine-grain access con...
Policy enforcement, or making sure that software behaves in line with a set of rules, is a problem o...
The day-to-day operations of corporations and government agencies rely on inter-operating software a...
Security is an essential feature and foremost concern to enterprise software systems. Today, applica...
The presentation shows how role-based access control (RBAC) models could be implemented using CORBA ...
We describe access control mechanisms of the Common Ob ject Request Broker Architecture (CORBA) and ...
Middleware is referred to as computer software that can connect various software components or appli...
State-of-the-art security mechanisms are often enforced in isolation from each other, which limits t...
Specifying and managing access control policies for large distributed systems is a non-trivial task....
This paper makes two primary contributions toward establishing support for application-specific fact...
Security is an essential feature and foremost concern to Internet and enterprise distributed softwar...
Security is an essential feature and foremost concern to enterprise software systems. Today, applica...
The way security mechanisms for large-scale distributed applications are engineered today has a numb...
Access control (AC) is a necessary defense against a large variety of security attacks on the resour...
Access control (AC) is a necessary defense against a large variety of security attacks on the resour...
Decoupling authorization logic from application logic allows applications with fine-grain access con...
Policy enforcement, or making sure that software behaves in line with a set of rules, is a problem o...
The day-to-day operations of corporations and government agencies rely on inter-operating software a...
Security is an essential feature and foremost concern to enterprise software systems. Today, applica...
The presentation shows how role-based access control (RBAC) models could be implemented using CORBA ...
We describe access control mechanisms of the Common Ob ject Request Broker Architecture (CORBA) and ...
Middleware is referred to as computer software that can connect various software components or appli...
State-of-the-art security mechanisms are often enforced in isolation from each other, which limits t...
Specifying and managing access control policies for large distributed systems is a non-trivial task....