Method and system for accessing a resource in a computing system

作者: Israel Laracuente , Farah Moaven

DOI:

关键词: Resource allocationResource breakdown structureHuman resource management systemWorkgroupKnowledge managementResource (project management)DatabaseBusinessComputing systems

摘要: Figure 4 shows a representation of scenario when workgroup manager in an organization assigns job profile to resource profile. In step (402), the builds (404), attempts build If resources are not executed from being grouped together same profile, is successfully built, (406). If, however, some explicit exclusion rules dictate that intended allowed be together, (408), notified may built. After has built passes rules, attempt assign (410). this assignment does violet related rule, (412), assigned target accordingly, (414).

参考文章(10)
Paul Erb, Danny Normand Prairie, Multiple owner resource management ,(1996)
Mary A. Galindo, Jean-Paul Champagne, Patricia A. Stange, Donna R. Hickman, Jerome D. Hudson, Cynthia M. K. Hickerson, Robert P. Lockhart, Nancy B. Saddler, System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential ,(1996)
Mukund Sankaranarayan, David S. Bakin, Terje K. Backman, Andy R. Raffman, William G. Parry, Jai Srinivasan, Michael B. Jones, Jayachandran Raja, Sean C. McDowell, Robin Speed, George Shaw, Dale A. Sather, Forrest C. Foltz, Resource manager architecture ,(2004)
Klaus Deinhart, Christoph Dr. Lingenfelder, Sven Dr. Lorenz, Virgil D. Dr. Gligor, Method and system for advanced role-based access control in distributed and centralized computer systems ,(1994)
Teresa Win, Emilio Belmonte, Role-based navigation of information resources ,(1999)
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, C.E. Youman, Role-based access control: a multi-dimensional view annual computer security applications conference. pp. 54- 62 ,(1994) , 10.1109/CSAC.1994.367293
Andreas Schaad, Jonathan Moffett, Jeremy Jacob, The role-based access control system of a European bank Proceedings of the sixth ACM symposium on Access control models and technologies - SACMAT '01. pp. 3- 9 ,(2001) , 10.1145/373256.373257