Hildmann et al., 1999 - Google Patents
Managing trust between collaborating companies using outsourced role based access controlHildmann et al., 1999
View PDF- Document ID
- 6478121206970861086
- Author
- Hildmann T
- Barholdt J
- Publication year
- Publication venue
- Proceedings of the fourth ACM workshop on Role-based access control
External Links
Snippet
In this document we describe an approach for modelling large organisations applying an RBAC-schema to control access to remote services of the organisation. The model is object- oriented, non-hierarchical and divides the organisation into dz@ rent contexts (posts …
- 230000001276 controlling effect 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5005—Allocation of resources, e.g. of the central processing unit [CPU] to service a request
- G06F9/5011—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6871232B2 (en) | Method and system for third party resource provisioning management | |
Tari et al. | A role-based access control for intranet security | |
US9313207B2 (en) | Apparatus and method for access validation | |
CA2376249C (en) | Data management system | |
US6947989B2 (en) | System and method for provisioning resources to users based on policies, roles, organizational information, and attributes | |
US6985955B2 (en) | System and method for provisioning resources to users based on roles, organizational information, attributes and third-party information or authorizations | |
US7950049B2 (en) | Hybrid meta-directory | |
US7707623B2 (en) | Self-service resource provisioning having collaborative compliance enforcement | |
Chadwick et al. | RBAC policies in XML for X. 509 based privilege management | |
EP2372594B1 (en) | Security sensitive data flow analysis | |
JP2004525444A (en) | Delegated management of information in the database directory using at least one arbitrary user group | |
US20080114769A1 (en) | Authorization data model | |
US6898595B2 (en) | Searching and matching a set of query strings used for accessing information in a database directory | |
WO2005022367A1 (en) | System and method for managing access entitlements in a computing network | |
US20050204297A1 (en) | Combined synchronous and asynchronous logical components in a collaborative context | |
Hildmann et al. | Managing trust between collaborating companies using outsourced role based access control | |
WO2002061653A9 (en) | System and method for resource provisioning | |
Craß et al. | Collaborative administration of role-based access control in smart contracts | |
Mundbrod et al. | Object-specific role-based access control | |
Lawall et al. | Resource management and authorization for cloud services | |
US7890394B2 (en) | Secure access to transaction based information | |
WO2002067173A9 (en) | A hierarchy model | |
Cissée | An architecture for agent-based privacy-preserving information filtering | |
Oleynik et al. | Model of security for object-oriented and object-attributed applications | |
WO2002046977A2 (en) | Knowledge based business processes and systems for implementation of same |