Data driven role based security

作者: Sergei Ivanov , John August Barrows

DOI:

关键词:

摘要: Data driven role based security is provided. At login, the system queries for a data context in connection with access to computing objects of system. When request received by system, one or more control expressions specified object being accessed are evaluated. The evaluation may reference user previously established, and returns set effective permissions. Access then granted if permissions includes an appropriate permission access.

参考文章(34)
Peter T. Brundrett, Clifford P. Van Dyke, Praerit Garg, Michael M. Swift, Richard B. Ward, Per property access control mechanism ,(1998)
Raymond R. Buettner, Stephen D. Donald, Robert McMillen, System and method for sharing of search query information across organizational boundaries ,(2007)
Norman Revell, A Min Tjoa, Günther Pernul, Makoto Takizawa, Roland Wagner, Gerald Quirchmayer, First International Conference on Availability, Reliability and Security (ARES´06) IEEE Computer Society Press. ,(2006)
Alfred Vieira, Chaitanya Bhatt, Yanik Grignon, Kedar Doshi, Yongsheng Wu, System, method and computer program product for determining an amount of access to data, based on a role ,(2011)
Ken Rodham, Roberto R. Chinnici, Database access bridge system and process ,(2002)
Timothy Prentiss Spellman, Joseph Edward Hafeman, Paul Michael Vetrano, Royyuru Dixit, Role-based access in a multi-customer computing environment ,(2007)
Alexander Szibbo, Bradley James Francis Palmer, Systems and methods for managing organizational information ,(2010)
Ravi Sandhu, Ramaswamy Chandramouli, Role-Based Access Control Features in Commercial Database Management Systems 21st National Information Systems Security Conference (NISSC '98); October 6-9, 1998; Crystal City, Virginia, United States. ,(1998)