Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Using semantic values to facilitate interoperability among heterogeneous information systems
ACM Transactions on Database Systems (TODS)
Coordinating context building in heterogeneous information systems
Journal of Intelligent Information Systems - Special issue on next generation information technologies
Database security
Role-Based Access Control Models
Computer
Readings in agents
Introduction to Multiagent Systems
Introduction to Multiagent Systems
A Role-Based Model for Access Control in Database Federations
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
Role engineering: From design to evolution of security schemes
Journal of Systems and Software
Representation of extended RBAC model using UML language
SOFSEM'05 Proceedings of the 31st international conference on Theory and Practice of Computer Science
Hi-index | 0.00 |
Development of information systems should answer more and more to the problems of federated data sources and the problems with heterogeneous distributed information systems. The assurance of access data security realized in federated information systems with loose connection among local data sources is hard to achieve mainly for two reasons: local data sources are heterogeneous (i.e. data, models, access security models, semantics, etc.) and local autonomy of systems does not allow to create a global integrated security schema. To solve such problems we propose to use the intelligent agents that can assist in a process of real-time access by defined and undefined users to the data stored in different systems, subsystems or applications of federated information systems.