Role-Based Access Control Models
Computer
Argos—a configurable access control system for interoperable environments
Proceedings of the ninth annual IFIP TC11 WG11.3 working conference on Database security IX : status and prospects: status and prospects
Designing Security Agents for the DOK Federated System
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
CHAOS: An Active Security Mediation System
CAiSE '00 Proceedings of the 12th International Conference on Advanced Information Systems Engineering
A Role-Based Model for Access Control in Database Federations
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Security Policy Coordination for Heterogeneous Information Systems
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Organization based access control
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
Hi-index | 0.00 |
The growing need to share information among independent sources is mostly satisfied by the construction of a Cooperative Information System. In our works, access schemas over physical tables or views of DBMS are described using a role-based model integrating constraints. This description allows to deal with problems related to the heterogeneity of access models, while keeping security properties of local schemas in order to comply with the autonomy of the cooperative stakeholders. In this paper, we describe the extensions proposed to the RBAC model to build access bridges among the local schemas. This proposition will be implemented in a Multi-Agents System ACSIS (Agents for the Cooperation of Secured Information Systems), compliant with XACML standard.