In the last few years, a number of spatial and spatio-temporal accesscontrolmodels have been developed especially in the framework of pervasive computing and location-aware applications. Yet, how useful and effectiv...
详细信息
ISBN:
(纸本)9781605585376
In the last few years, a number of spatial and spatio-temporal accesscontrolmodels have been developed especially in the framework of pervasive computing and location-aware applications. Yet, how useful and effective those models are in real applications is still to be proved. the goal of this panel is to discuss accesscontrol requirements in mobile applications, trying to link research to real business problematic.
We address some fundamental questions, which were raised by Atluri and Ferraiolo at SacmAT'08, on the prospects for and benefits of a meta-model of accesscontrol. We demonstrate that a meta-model for access contr...
详细信息
ISBN:
(纸本)9781605585376
We address some fundamental questions, which were raised by Atluri and Ferraiolo at SacmAT'08, on the prospects for and benefits of a meta-model of accesscontrol. We demonstrate that a meta-model for accesscontrol can be defined and that multiple accesscontrolmodels can be derived as special cases. An anticipated consequence of the contribution that we describe is to encourage researchers to adopt a meta-model view of accesscontrol rather than them developing the next 700 particular instances of accesscontrolmodels.
this panel discusses specific challenges in the usability of accesscontroltechnologies and new opportunities for research. the questions vary from "Why nobody, even experts, uses accesscontrol lists (ACLs)?&qu...
详细信息
ISBN:
(纸本)9781605585376
this panel discusses specific challenges in the usability of accesscontroltechnologies and new opportunities for research. the questions vary from "Why nobody, even experts, uses accesscontrol lists (ACLs)?" to "Shall accesscontrols (and corresponding languages) be totally embedded and invisible and never, ever seen by the users?" to "What should be the user-study methodology for accesscontrol systems?".
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existing roles to entitlements from newly dep...
详细信息
ISBN:
(纸本)9781605585376
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existing roles to entitlements from newly deployed applications is usually very high. In this paper, a learning-based approach to automate the provisioning process is proposed and its effectiveness is verified by real provisioning data. Specific learning issues related to provisioning are identified and relevant solutions are presented.
accesscontrolmodels are usually static, i.e., permissions are granted based on a policy that only changes seldom. Especially for scenarios in health care and disaster management, a more flexible support of access co...
详细信息
ISBN:
(纸本)9781605585376
accesscontrolmodels are usually static, i.e., permissions are granted based on a policy that only changes seldom. Especially for scenarios in health care and disaster management, a more flexible support of accesscontrol, L e., the underlying policy, is needed. Break-glass is one approach for such a flexible support of policies which helps to prevent system stagnation that could harm lives or otherwise result in losses. Today, break-glass techniques axe usually added on top of standard accesscontrol solutions in an ad-hoc manner and, therefore, lack an integration into the underlying accesscontrol paradigm and the systems' accesscontrol enforcement architecture. We present an approach for integrating, in a fine-grained manner, break-glass strategies into standard accesscontrolmodels and their accompanying enforcement architecture. this integration provides means for specifying break-glass policies precisely and supporting model-driven development techniques based on such policies.
暂无评论