Role-Based Access Control Models
Computer
Software architecture: perspectives on an emerging discipline
Software architecture: perspectives on an emerging discipline
Authentication, access control, and audit
ACM Computing Surveys (CSUR)
Data warehousing: concepts, technologies, implementations, and management
Data warehousing: concepts, technologies, implementations, and management
Object-oriented client/server Internet environments
Object-oriented client/server Internet environments
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
A framework for object-oriented on-line analytic processing
Proceedings of the 1st ACM international workshop on Data warehousing and OLAP
The role graph model and conflict of interest
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
The ARBAC97 model for role-based administration of roles
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
An architectural application framework for evolving distributed systems
Journal of Systems Architecture: the EUROMICRO Journal - Special issue on new trends in programming and execution models for parallel architectures, heterogeneously distributed systems and mobile computing
Enterprise Application Integration with CORBA: Component and Web-Based Solutions
Enterprise Application Integration with CORBA: Component and Web-Based Solutions
Security Moving from Database Systems to ERP Systems
DEXA '98 Proceedings of the 9th International Workshop on Database and Expert Systems Applications
Policy-enhanced ANFIS model to counter SOAP-related attacks
Knowledge-Based Systems
Hi-index | 0.00 |
Security is a growing concern to enterprise systems when they become open to e-commerce using the Internet. This is particularly severe in the e-commerce applications using knowledge management systems, which generally maintain critical information about the enterprise. Security usually affects all parts of a system and to be effective must therefore be integrated in the enterprise architecture. This paper describes CODA驴a complex organic distributed architecture for modeling distributed knowledge management systems applied to business intelligence; and proposes security system architecture to be integrated to it. The foundation of the security system is a role-based access control model, which provides all the functionality required by a security system, including authentication and auditing.