Issues in the design of computer support for co-authoring and commenting
CSCW '90 Proceedings of the 1990 ACM conference on Computer-supported cooperative work
Role-Based Access Control Models
Computer
Policies and roles in collaborative applications
CSCW '96 Proceedings of the 1996 ACM conference on Computer supported cooperative work
Design systolic systems: Illustrating of regular algorithms on synchronous array processors
Design systolic systems: Illustrating of regular algorithms on synchronous array processors
Constraints for role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Role activation management in role based access control
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Network-level access control policy analysis and transformation
IEEE/ACM Transactions on Networking (TON)
Toward a target and coupling function of three different Information Security Management Systems
Concurrency and Computation: Practice & Experience
Business Driven User Role Assignment: Nimble Adaptation of RBAC to Organizational Changes
International Journal of Information Security and Privacy
Hi-index | 0.00 |
Abstract: The nature of an open distributed environment provides a resoundingly diverse yet potentially chaotic environment for users. A great deal of research has focused on the management of resources in such an environment and policy-based management has emerged as one such promising solution. In order to support large evolving enterprises we are currently developing a policy model that will be scalable and able to cope with the extraordinarily high rate of change inherent in such environments. To do this we have developed a number of novel concepts including, enterprise domain, policy space and policy authority which are unique and central to our approach. The overall objective of producing this model is to support dynamic roles, dynamic policies and the subsequent dynamic conflict analysis. Prevailing policy-based management models largely promote the static definition and analysis of policy. We argue that although these models are suitable for homogenous, largely static environments, they are too rigid to adequately represent large, heterogeneous, evolving enterprise as the fluidity and complexity of interactions occurring in such environments are genuinely difficult and often impossible to pre-empt at the time of policy specification and role assignment.