Integrating role graphs: a tool for security integration
โ Scribed by Sylvia Osborn
- Publisher
- Elsevier Science
- Year
- 2002
- Tongue
- English
- Weight
- 307 KB
- Volume
- 43
- Category
- Article
- ISSN
- 0169-023X
No coin nor oath required. For personal study only.
โฆ Synopsis
Role-based access control provides a very flexible set of mechanisms for managing the access control of a complex system with many users, objects and applications. The role graph model of Nyanchama and Osborn is one example of how role administration algorithms can be implemented. In our previous research, we have also shown how the access control information of existing systems can be extracted and represented as a role graph. In this paper, we extend this research by showing how, when two systems are being integrated, their role graphs can also be integrated.
๐ SIMILAR VOLUMES
Tools and tool handling techniques designed for demonstrating the use of the Advanced Teleoperation System at JPL in satellite repair operations are described in this paper. Our model for the repair demonstration is the Main Electronics Box (MEB) replacement on the Solar Maximum Satellite Repair (SM
## This article addresses the impact of microcomputers on information system integrity and security and suggests modifications to system controls appropriate to both standalone and networked microcomputers. Common business applications are identified and associated threats described. Appropriate