Late constraint management

作者: David P. Moore , Franz Wolfhagen , Rune H. Larsen

DOI:

关键词:

摘要: A method and system for integrating restrictions in an identity management is provided. The includes generating a role/account attribute table storage from static dynamic rule defined values. role request first associated with user received set of attributes comprising result the are calculated. transmitted to target evaluation received.

参考文章(11)
David J. Steeves, Krishna C. Vitaldevara, Luke T. Abrams, Ariel N. Gordon, Pui-Yin Wong, Communicating state information to legacy clients using legacy protocols ,(2013)
Dean H. Vogler, Mahesh V. Tripunitara, Patrick Toomey, System and Methods for Access Control Based on a User Identity ,(2014)
Alexander Phillip Amies, Christopher Michael Bauserman, Sadanand Rajaram Bajekal, Leanne L. Chen, Sridhar R. Muppidi, Managing user access entitlements to information technology resources ,(2007)
Avishek Saha, Managing Delegation in Access Control Models international conference on advanced computing. pp. 744- 751 ,(2007) , 10.1109/ADCOM.2007.87