World Library  


Add to Book Shelf
Flag as Inappropriate
Email this Book

Business Process Driven Framework for Defining an Access Control Service Based on Roles and Rules

Click here to view

Book Id: WPLBN0000699235
Format Type: PDF eBook
File Size: 63.08 KB.
Reproduction Date: 2005
Full Text

Title: Business Process Driven Framework for Defining an Access Control Service Based on Roles and Rules  
Author:
Volume:
Language: English
Subject: Technology., Reference materials, Technology and literature
Collections: Techonology eBook Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

Business Process Driven Framework for Defining an Access Control Service Based on Roles and Rules. (n.d.). Business Process Driven Framework for Defining an Access Control Service Based on Roles and Rules. Retrieved from http://ebook2.worldlibrary.net/


Description
Technical Reference Publication

Excerpt
Abstract: Defining an Access Control Service for an enterprise application requires the choice of an access control model and a process for formulation of access decision rules to be used by the access enforcement mechanism. In this paper, we describe a business process driven framework (called the BPD-ACS) for developing both the model and formulating the access decision rules. The model used is the Role Based Access Control (RBAC) model and the access decision rules are based on temporal business associations. The enterprise setting is a multi-facility hospital and the particular application for which the access control service was defined is the Hospital-based Laboratory Information System. (HLIS).The lesson learnt from this exercise is that a much more sophisticated rule processing capability is required for these types of applications than is currently available in both commercial and research-prototype authorization servers.

Table of Contents
Table of Contents.................................................................................................................................ii Refereed Papers Next Generation Intrusion Detection: Autonomous Reinforcement ...........................File Size: 90 K Learning of Network Attacks James Cannady, Georgia Institute of Technology Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection..........File Size: 113 K Susan M. Bridges & Rayford B. Vaughn, Mississippi State University

 

Click To View

Additional Books


  • Evaluated Kinetic and Photochemical Data... (by )
  • Toward Next-Generation Construction Mach... (by )
  • Reporting 
  • Secure Cyberspace 
  • Thermodynamic Properties of Dioxygen Dif... (by )
  • Thermodynamic Functions and Properties o... (by )
  • Cross Sections and Related Data for Elec... (by )
  • Cross Sections and Swarm Coefficients fo... (by )
  • Administrative Modifications 
  • Indefinite Delivery Indefinite Quantity ... 
  • Credit Card Purchases 
  • Awards 
Scroll Left
Scroll Right

 



Copyright © World Library Foundation. All rights reserved. eBooks from World eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.