Searching for Flexible Support For Multiple Access Control Policies information? Find all needed info by using official links provided below.
https://dl.acm.org/doi/10.1145/383891.383894
As a consequence, although different policy choices are possible in theory, in practice only a specific policy can actually be applied within a given system. In this paper, we present a unified framework that can enforce multiple access control policies within a single system.
https://www.researchgate.net/publication/220225209_Flexible_Support_for_Multiple_Access_Control_Policies
Flexible Support for Multiple Access Control Policies Article in ACM Transactions on Database Systems 26(2):214-260 · June 2001 with 52 Reads How we measure 'reads'
https://dl.acm.org/citation.cfm?id=383894
As a consequence, although different policy choices are possible in theory, in practice only a specific policy can actually be applied within a given system. In this paper, we present a unified framework that can enforce multiple access control policies within a single system.Cited by: 851
http://www.di.unito.it/~mlsapino/Sapino-documenti2006/RIVISTE/J8.pdf
Flexible Support for Multiple Access Control Policies 215 a single system. The framework is based on a language through which users can specify security policiestobeenforcedonspecificaccesses.Thelanguageallowsthespecificationofbothpositiveand negative authorizations and incorporates notions of authorization derivation, conflict resolution,
https://www.deepdyve.com/lp/association-for-computing-machinery/flexible-support-for-multiple-access-control-policies-8AKMUVVnMd
Jun 01, 2001 · Read "Flexible support for multiple access control policies, ACM Transactions on Database Systems (TODS)" on DeepDyve, the largest online rental service for scholarly research with thousands of academic publications available at your fingertips.
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.544.1070
CiteSeerX - Document Details (Isaac Councill, Lee Giles, Pradeep Teregowda): Although several access control policies can be devised for controlling access to information, all existing authorization models, and the corresponding enforcement mechanisms, are based on a specific policy (usually the closed policy). As a consequence, although different policy choices are possible in theory, in ...
https://www.semanticscholar.org/paper/Flexible-support-for-multiple-access-control-Jajodia-Samarati/24df88587defa9ee7609036feaa4121119ceb22d
Flexible support for multiple access control policies @article{Jajodia2001FlexibleSF, title={Flexible support for multiple access control policies}, author={Sushil Jajodia and Pierangela Samarati and Maria Luisa Sapino and V. S. Subrahmanian}, journal={ACM Trans. Database Syst.}, year={2001}, volume={26}, pages={214-260} }
https://ieeexplore.ieee.org/document/1236296/
Aug 29, 2003 · A flexible database security system using multiple access control policies Abstract: Due to various requirements for user access control to large databases in hospitals and banks, database security has been emphasized. There are many security models for database systems using a wide variety of policy-based access control methods.
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.4284
In this paper, we propose a flexible authorization mechanism that can support different security policies. The mechanism enforces a general authorization model onto which multiple access control policies can be mapped.
https://csrc.nist.gov/Projects/Access-Control-Policy-and-Implementation-Guides
Mar 29, 2018 · Access Control Policy and Implementation Guides. Project Links. ... access control is a special concern for systems that are distributed across multiple computers. These distributed systems can be a formidable challenge for developers, because they may use a variety of access control mechanisms that must be integrated to support the ...
How to find Flexible Support For Multiple Access Control Policies information?
Follow the instuctions below:
- Choose an official link provided above.
- Click on it.
- Find company email address & contact them via email
- Find company phone & make a call.
- Find company address & visit their office.