Object oriented programming: an evolutionary approach
Object oriented programming: an evolutionary approach
A modular approach to composing access control policies
Proceedings of the 7th ACM conference on Computer and communications security
Going beyond MAC and DAC using mobile policies
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Business Object Component Architecture
IEEE Software
Using attribute certificates with mobile policies in electronic commerce applications
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Separation of Duty in Role-based Environments
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Providing policy control over object operations in a mach based system
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
Hi-index | 0.00 |
This paper briefly traces the evolution of information system architectures from mainframe-connected terminals to distributed multi-tier architectures. It presents the challenges facing developers of multitier information systems in providing effective consistent data policy enforcement, such as access control in these architectures. Finally, it introduces "Mobile Policy" (MoP) as a potential solution and presents a framework for using mobile policy in the business logic tier of multi-tier information systems.