๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Integrating role graphs: a tool for security integration

โœ Scribed by Sylvia Osborn


Publisher
Elsevier Science
Year
2002
Tongue
English
Weight
307 KB
Volume
43
Category
Article
ISSN
0169-023X

No coin nor oath required. For personal study only.

โœฆ Synopsis


Role-based access control provides a very flexible set of mechanisms for managing the access control of a complex system with many users, objects and applications. The role graph model of Nyanchama and Osborn is one example of how role administration algorithms can be implemented. In our previous research, we have also shown how the access control information of existing systems can be extracted and represented as a role graph. In this paper, we extend this research by showing how, when two systems are being integrated, their role graphs can also be integrated.


๐Ÿ“œ SIMILAR VOLUMES


Integrated tools for teleoperated satell
โœ H. Das; P. Fiorini ๐Ÿ“‚ Article ๐Ÿ“… 1993 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 647 KB

Tools and tool handling techniques designed for demonstrating the use of the Advanced Teleoperation System at JPL in satellite repair operations are described in this paper. Our model for the repair demonstration is the Main Electronics Box (MEB) replacement on the Solar Maximum Satellite Repair (SM

Security and integrity controls for micr
โœ J.L. Boockholdt ๐Ÿ“‚ Article ๐Ÿ“… 1987 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 819 KB

## This article addresses the impact of microcomputers on information system integrity and security and suggests modifications to system controls appropriate to both standalone and networked microcomputers. Common business applications are identified and associated threats described. Appropriate