Obelheiro et al., 2002 - Google Patents
Role-based access control for CORBA distributed object systemsObelheiro et al., 2002
View PDF- Document ID
- 5683047182562731087
- Author
- Obelheiro R
- Fraga J
- Publication year
- Publication venue
- Proceedings of the Seventh IEEE International Workshop on Object-Oriented Real-Time Dependable Systems.(WORDS 2002)
External Links
Snippet
This paper shows how role-based access control (RBAC) models can be implemented in distributed object-based systems that follow OMG/CORBA standards. We introduce a novel approach that provides for automatic role activation by the security components of the …
- 230000004913 activation 0 abstract description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/04—Programme control other than numerical control, i.e. in sequence controllers or logic controllers
- G05B19/042—Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
- G05B19/0426—Programming the control sequence
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/20—Pc systems
- G05B2219/25—Pc structure of the system
- G05B2219/25428—Field device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8341707B2 (en) | Near real-time multi-party task authorization access control | |
US5911143A (en) | Method and system for advanced role-based access control in distributed and centralized computer systems | |
US7392546B2 (en) | System and method for server security and entitlement processing | |
US20090205018A1 (en) | Method and system for the specification and enforcement of arbitrary attribute-based access control policies | |
CN107342992A (en) | A kind of System right management method, apparatus and computer-readable recording medium | |
US6678682B1 (en) | Method, system, and software for enterprise access management control | |
Shands et al. | Secure virtual enclaves: Supporting coalition use of distributed application technologies | |
Abou El Kalam et al. | Access control for collaborative systems: A web services based approach | |
Obelheiro et al. | Role-based access control for CORBA distributed object systems | |
Moffett | Delegation of authority using domain-based access rules | |
Gudes et al. | Modelling, specifying and implementing workflow security in cyberspace | |
Sinnott et al. | Experiences of applying advanced grid authorisation infrastructures | |
Ahn | Role-based access control in DCOM | |
Liebrand et al. | Role delegation for a resource-based security model | |
Bergström et al. | Access Management in Organizations: A Comprehensive Study and Scenario-based Analysis | |
Peterkin et al. | Role based access control for uddi inquiries | |
Waschke | Cloud-Specific Standards: A Tide to Raise All Boats | |
Irwin et al. | Identity, credential, and access management at NASA, from Zachman to attributes | |
Phillips et al. | Security assurance for an rbac/mac security model | |
Jensen et al. | Policy expression and enforcement for handheld devices | |
Van De Riet et al. | Security in cyberspace: a knowledge-base approach | |
CN114139127A (en) | Authority management method of computer system | |
Fernandez et al. | Securing design patterns for distributed systems | |
Zhang et al. | A role-based access control model and implementation for data-centric enterprise applications | |
Kodituwakku et al. | A pattern language for designing and implementing role-based access control |