Override for Policy Enforcement System

作者: Juda Thitron , Eugene (John) Neystadt , Dima Datsenko

DOI:

关键词:

摘要: A policy enforcement system may have a mechanism for assisting user in obtaining an exception to given policy. The collect information from the as why is requested, then manage throughout security system. An define conditions when be granted automatically, well only through approval process. created by logged audit file so that each documented. Different exceptions defined different and one or more paths which granted. used any type of access control resource, including URL resources, physical peripherals networks, data applications, other resource.

参考文章(11)
Vinod Katkam, Christopher E. Pearce, Shmuel Shaffer, Labhesh Patel, Randall B. Baird, Mukul Jain, Sanjeev Kumar, Authorization to place calls by remote users ,(2006)
Rakesh Agrawal, Roberto Bayardo, Christos Faloutsos, Jerry Kiernan, Ralf Rantzau, Ramakrishnan Srikant, Auditing compliance with a Hippocratic database very large data bases. pp. 516- 527 ,(2004) , 10.1016/B978-012088469-8.50047-4
Ralf Rantzau, Mark D. Feblowitz, Anton V. Riabov, Ramakrishnan Srikant, Angela Schuett, Grant Wagner, Nagui Halim, Genady Grabarnik, Alexandre V. Evfimievski, Kay S. Anderson, Zhen Liu, Mitigating and managing privacy risks using planning ,(2006)
Iulian Vlasov, Dev Doongoor, Punipriya Misri, Mee Tchin Jane John Chuan, System and Method for Performing Access Control ,(2011)