With the growing needs for and the benefits of\ud sharing resources and information among different organizations,an interoperation framework that automatically integrates policies to facilitate such cross-domain sharing in a secure way is becoming increasingly important. To avoid security breaches, such policies must enforce the policy constraints of the individual domains. Such constraints may include temporal constraints that\ud limit the times when the users can access the resources, and\ud separation of duty (SoD) constraints. Existing interoperation solutions do not address such cross-domain temporal access control and SoDs requirements. In this paper, we propose a role-based framework to facilitate secure interoperation among multipl...
Workflows and role-based access control models need to be suitably merged, in order to allow users t...
Workflows and role-based access control models need to be suitably merged, in order to allow users t...
Although several access control policies can be devised for controlling access to information, all e...
With the growing needs for and the benefits of\ud sharing resources and information among different ...
With the growing needs for and the benefits of sharing resources and information among different org...
Multidomain environments where multiple organizations interoperate with each other are becoming a re...
Multidomain environments where multiple organizations interoperate with each other are becoming a re...
Ensuring secure interoperation in multidomain environments based on role based access control (RBAC)...
With the increase in information and data accessibility, there is a growing concern for security and...
This is an open access article that can be obtained from the link below - Copyright @ 2006 Springer ...
Multidomain application environments where distributed multiple organizations interoperate with each...
Information service platforms or management information systems of various institutions or sectors o...
A key issue in computer system security is to protect information against unauthorized access. Emerg...
Abstract—By collaboration, domains share resources effec-tively. To maintain security properties of ...
Multidomain application environments where distributed multiple organizations interoperate with each...
Workflows and role-based access control models need to be suitably merged, in order to allow users t...
Workflows and role-based access control models need to be suitably merged, in order to allow users t...
Although several access control policies can be devised for controlling access to information, all e...
With the growing needs for and the benefits of\ud sharing resources and information among different ...
With the growing needs for and the benefits of sharing resources and information among different org...
Multidomain environments where multiple organizations interoperate with each other are becoming a re...
Multidomain environments where multiple organizations interoperate with each other are becoming a re...
Ensuring secure interoperation in multidomain environments based on role based access control (RBAC)...
With the increase in information and data accessibility, there is a growing concern for security and...
This is an open access article that can be obtained from the link below - Copyright @ 2006 Springer ...
Multidomain application environments where distributed multiple organizations interoperate with each...
Information service platforms or management information systems of various institutions or sectors o...
A key issue in computer system security is to protect information against unauthorized access. Emerg...
Abstract—By collaboration, domains share resources effec-tively. To maintain security properties of ...
Multidomain application environments where distributed multiple organizations interoperate with each...
Workflows and role-based access control models need to be suitably merged, in order to allow users t...
Workflows and role-based access control models need to be suitably merged, in order to allow users t...
Although several access control policies can be devised for controlling access to information, all e...