We present a role-based access control (RBAC) mechanism for a Web Services based data integration system. The RBAC model is extended to allow for role hierarchies and permissions to be project-specific, and the authorization structure is designed to allow custodians contributing data to the integration system to control the authorization over their own data. To address the issue of allowing custodians without IT support to comply with privacy law or ethical standards, a simple access control language amenable to being edited in a GUI is used to express policies. This is translated into XACML for standards-based implementation
We present an approach based on roles and access policies to improve security management of Web Appl...
With the increasing number of users and applications, enterprises or organizations need to effective...
With the wide adoption of Internet, security of web database is a key issue. In web-based applicatio...
Security is a key requirement in multi-user hypermedia systems, where the ability of different users...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
Current proposals for access control languages cannot specify policies required by specific applicat...
International audienceThe majority of today's web-based applications are based on back-end databases...
Project (M.S., Computer Science)--California State University, Sacramento, 2012.This project explore...
Recently there has been considerable interest in role-based access control (RBAC) as an alternative,...
The amount of Web applications used to replace existing traditional business applications has recent...
Role-Based Access Control (RBAC) is increasingly used for ensuring security and privacy in complex o...
In order for intranets to reach their full potential, access control and authorization management me...
Nowadays, with the exception of very small companies, almost all companies and institutions are hier...
Abstract This article introduces a family of reference models for role-based access control (RBAC) i...
Motivated by the need to manage and enforce the strong access control technology of Web environments...
We present an approach based on roles and access policies to improve security management of Web Appl...
With the increasing number of users and applications, enterprises or organizations need to effective...
With the wide adoption of Internet, security of web database is a key issue. In web-based applicatio...
Security is a key requirement in multi-user hypermedia systems, where the ability of different users...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
Current proposals for access control languages cannot specify policies required by specific applicat...
International audienceThe majority of today's web-based applications are based on back-end databases...
Project (M.S., Computer Science)--California State University, Sacramento, 2012.This project explore...
Recently there has been considerable interest in role-based access control (RBAC) as an alternative,...
The amount of Web applications used to replace existing traditional business applications has recent...
Role-Based Access Control (RBAC) is increasingly used for ensuring security and privacy in complex o...
In order for intranets to reach their full potential, access control and authorization management me...
Nowadays, with the exception of very small companies, almost all companies and institutions are hier...
Abstract This article introduces a family of reference models for role-based access control (RBAC) i...
Motivated by the need to manage and enforce the strong access control technology of Web environments...
We present an approach based on roles and access policies to improve security management of Web Appl...
With the increasing number of users and applications, enterprises or organizations need to effective...
With the wide adoption of Internet, security of web database is a key issue. In web-based applicatio...