Role-Based Access Control Models
Computer
Introducing SSL and certificates using SSLeay
World Wide Web Journal - Special issue: Web security: a matter of trust
Access control in federated systems
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Role-based access control on the web
ACM Transactions on Information and System Security (TISSEC)
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
SMART: Towards Spatial Internet Marketplaces
Geoinformatica
Authorization and Access Control in IRO-DB
ICDE '96 Proceedings of the Twelfth International Conference on Data Engineering
An Approach for Building Secure Database Federations
VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases
Access Rights Administration in Role-Based Security Systems
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
Towards Security in an Open Systems Federation
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Efficient Web Access to Distributed Biological Collections Using a Taxonomy Browser
SSDBM '00 Proceedings of the 12th International Conference on Scientific and Statistical Database Management
Charging for information services in Service-Oriented Architectures
BSN '05 Proceedings of the IEEE EEE05 international workshop on Business services networks
Role based access control for a medical database
SEA '07 Proceedings of the 11th IASTED International Conference on Software Engineering and Applications
A service-centric approach to a parameterized RBAC service
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
An empirical study on the usability of logout in a single sign-on system
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Enhancing consumer privacy in the liberty alliance identity federation and web services frameworks
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Authorization in cross-border eHealth systems
Information Systems Frontiers
Hi-index | 0.00 |
There is rapidly increasing interest in Australia in on-line sharing of information stored in corporate databases, especially within and between staff of independent government agencies. Biological collections databases and population health GIS are good examples of the frequent situation where database custodians are looking for dynamic, distributed, heterogenous federated information system models for information sharing within loosely constituted communities. This paper describes a security model for authentication and access control to federated systems. The model supports single sign-on for users; a high level of autonomy for database custodians; and a low maintenance overhead. The model's implementation using PKI and Web technology is described.