Realization of a Context-Dependent Access Control Mechanism on a Commercial Platform

Size: px
Start display at page:

Download "Realization of a Context-Dependent Access Control Mechanism on a Commercial Platform"

Transcription

1 Realization of a Context-Dependent Access Control Mechanism on a Commercial Platform U. Nitsche Dept. of Electronics and Computer Science, University of Southampton Southampton, SO17 1BJ, United Kingdom, un@ecs.soton.ac.uk R. Holbein, O. Morger, S. Teufel Department of Computer Science, University of Zurich Winterthurerstrasse 190, CH-8057 Zurich, Switzerland, fholbein, omorger, teufelg@ifi.unizh.ch Abstract Recently, context-dependent access control mechanisms were established: Information about the state of a business process is combined with general knowledge about a person to grant or revoke access to sensitive data. Though being understood very well in principle, many different problems arise when context-dependent access control is realized for an application of practical relevance on a concrete platform. We present in this paper the implementation of context-dependent access control for a client-/server-based hospital information system. The system is WindowsNT-based and is implemented with MS Visual Basic on an MS SQL Server database. Additionally there is an Action Technology workflow system that provides the required context information. We will demonstrate how the context-dependent access control can be implemented taking into account the constraints of the given platform. Keywords Context-dependency, access control, business processes, implementation 1 INTRODUCTION In (Holbein et al. 1997) and previous papers (Holbein et al. 1995, Holbein et al. 1996), the concept of a context dependent access-control has been introduced and discussed exhaustively. (Holbein et al. 1997) also presents the implementation of the concepts on an experimental academic platform. It is the aim of cifip Published by Chapman & Hall

2 2 Realization of a Context-Dependent Access Control Mechanism the present paper to prove that the implementation of a context-dependent access control is also possible on a commercial, widely used platform which is lacking some of the experimental platform s features. The current paper does not address the issues of security design according to (Holbein et al. 1996, Holbein 1996). These papers show that context-dependent access definitions are inherent to business process models (BPMs). Moreover these papers show how to address the problem of conflicting roles or role activation conflicts which must be considered during definition of role based access rights already. In context-dependent access control mechanisms, information about the state of a business process is combined with general knowledge about the organizational role of a user to grant or revoke access to sensitive data. The basic concepts of such an access control scheme are understood very well (Holbein 1996). However, when starting with the development of a concrete system facilitated with a context-dependent access control, one faces several minor and major problems: existing access control mechanisms of the given platform have to be adapted to support context-dependency, drawbacks of the platform in order to implement context-dependency have to be overcome, missing but necessary features have to be implemented indirectly, etc. Technological support for the inter-departmental co-operation in hospitals taking into account security concerns is the focus of the Swiss National Science Foundation granted project MobiMed (Fischer et al. 1995). The hospital information system discussed in this paper was and still is developed in the MobiMed project. The overall system will be used as a prototype within the Clinical Research Centre of the University Hospital of Basel in order to demonstrate the potentials of IT-support in a hospital. It is PC-based (Windows NT) and implemented in MS Visual Basic accessing MS SQL Server. The context information which is used for the evaluation of whether to grant or revoke data access to a user dynamically, is delivered by an Action Technology workflow system, which builds the core control component of the implementation. We discuss in the present paper our implementation solution for a contextdependent access control for the platform described above. After a short introduction into context-dependent access control, we present the different components of our system, including a discussion of the interfaces. Then we present the implementation of the context-dependent access control mechanism. Finally, we conclude by briefly discussing our experience with the access control mechanism, its suitability to the application area of a hospital and the platform of our implementation respectively. MobiMed (Privacy and Efficiency of Mobile Medical Systems) is a project of the Swiss Priority Programme (SPP) for Information and Communications Structures (ICS; ) of the Swiss National Science Foundation (SNSF) aiming at the development of mobile access to data in a clinical environment. Its contributing members are the Computer Science Department of the University of Zurich, the Gastroenterological Department of the University Hospital of Basel, Triangle Micro Research AG, Liestal, and Plattner Schulz Partner AG, Basel.

3 Context-Dependent Access Control 3 2 CONTEXT-DEPENDENT ACCESS CONTROL Role based security approaches fit well the hierarchically structured setting of a hospital (Ting et al. 1991, Ting et al. 1992). Each level in the hierarchy can be mapped to a so called organizational role that a person plays in the hospital (e.g. medical personnel, care personnel, etc.). After an analysis of each role s demands on obtaining particular data to perform work, access rights are assigned to each role. The access rights determine which records in the database that contains information about the patients (patient records) may be read, written, or changed by a person playing a particular role. When logging in, a person identifies herself or himself by, for instance, using a chipcard and a PIN, and then a role is assigned to the person according to user/ role lists, determining her or his access rights. Simple role based access control mechanisms have the advantage of being implementable rather easily but the drawback of certain inflexibilities. A more sophisticated access control technique refining the role based approach takes into account the question of whether it is reasonable that a person playing a particular role needs access to certain data, for instance at the current state of a health care process. Obviously, it is not necessary to have access to all data about a particular patient all the time. The question of what does one need-to-know? gave the considered principle its name: the need-to-know principle. Moreover, what does one need-to-know right now (at the time of an access request) is the context-dependent access control scheme that we consider in this paper. A possible realization of the need-to-know principle can be achieved by combining user role information with state information of a workflow ( Is it reasonable to grant access to a person (playing a particular role) in the given workflow state? ). A workflow system which can be used to determine context-information is the Action Workflow approach (Medina-Mora et al. 1992). From a generic point of view the conceptual overview of our comprehensive context-dependent access control system consists of two parts as presented in Figure 1: First, there is a security design subsystem that is connected to the access control system for administration of access rights according to a need-to-know policy. The security design system includes a number of interfaces that allow to import business models, e.g. business process models (BPM), to automatically derive security information and to establish need-to-know security models (Holbein et al. 1996, Holbein et al. 1996). These need-to-know security models can be exported to a number of access control systems. Again, there are interfaces that translate the security model to specific access control information that can be interpreted by the target system. Second, there is a context authentication subsystem which can be linked to different access control systems (ACS). In general, it is very useful when BRS and BAS (see Figure 1) are interrelated (e.g. it simplifies implementation), for example workflow management systems (WFMS; in our case the WFMS is

4 4 Realization of a Context-Dependent Access Control Mechanism Business Representation System (BRS) 1...n, e.g. Business Process Modelling BRS Interface 1...n Business Automation System (BAS) 1...n, e.g. Workflow Management BAS Server Interface 1...n Universal Security Design (Sub-)System Context Authentication (Sub-)System ACS Interface 1...m Management Interface Administration of Access Rights ACS Client Interface 1...m Context Authentication Hook Evaluation of Access Requests Access Control System (ACS) 1...m Figure 1 Conceptual overview of the access control system. the Action Workflow system, AWS) that usually include a business process modelling component as well as a workflow control engine (AW Administrator). However, this is not necessary in principle. 3 REALIZATION OF THE CLIENT-/SERVER-SYSTEM Our target for implementing context-dependent access control is a workflowbased client/server solution for the technological support of nursing as well as medical and administrative duties in health care environments, i.e. our solution follows the idea of a WFMS-based solution as mentioned in the previous section. The server s database contains information on both, the patient record as well as the current state of the patient s examination and treatment which we would like to call a health care process. This means, there is a common database management system (DBMS) for both, the hospital information system as well as the WFMS. This SQL-database also handles access rights of users and performs access controls. Each state in a health care process determines who has to perform what next. An add-on workflow engine keeps track of these states and controls health care processes. Medical data is stored directly in the database; process information is stored there via the workflow engine. Control is given completely to the workflow engine which may trigger additional programs to collect or update data in a patient s record. Clients are, in a simplified picture, terminal applications to access information about patient records and tasks of clinical staff. A user logs in and, depending on his/her role in the hospital s hierarchy as well as involvement in certain health care processes, receives information about pending duties, may enter information according to his/her current tasks, and may access information necessary to do his/her actual work. In accordance to developments in the EU project EXODUS (Francis et al. 1997), these clients will run

5 Realization of the Client-/Server-System 5 Client (on which the applications are running) flat LCD screen (high resolution) keyboard terminal fixed to the hospital bed to the network trigger application program Server SQL Database Workflow Engine outside interactions Figure 2 The hospital bed unit (HBU). on a personal computer that is fixed to a hospital bed. Hospital beds plus their PC units are called mobile hospital bed units (HBU). HBUs can be moved all across the hospital and connected to the network at different physical locations. Such an HBU and the server platform to which it establishes a connection are presented in brief in Figure 2. The client platform at the HBU is a WindowsNT Workstation. The client software is written in MS Visual Basic. The server platform is also WindowsNT running an Action Technology workflow system (the AW Administrator) as well as an MS SQL Server database system containing both, the patient records as well as the complete workflow information (AW Administrator is added on the MS SQL Server). The MS Visual Basic client applications are the parts of the system which access the patient records in the MS SQL Server database. What remains is to adapt this system configuration to the requirements of the context-dependent access control scheme described in the previous section. We present how context-dependent access control can be realized for our given platform. To do so, we have to find a solution for adapting the given MS SQL Server security mechanisms that allows to include contextdependency for access control decisions, i.e. the CARDS component as introduced in (Holbein et al. 1997). MS SQL Server uses a user and a group concept to grant or revoke access to tables or even table entries. This concept is explained in Figure 3 showing a detail of a patient record. Figure 3 denotes

6 6 Realization of a Context-Dependent Access Control Mechanism inherit access rights of group care personnel to group medical personnel by making it a subgroup of group care personnel grant access to table "Department/Room" to group care personnel Department/Room InvestigationDept/A401 MedicineI/B323 MedicineI/B311 Radiology/Lab1 Type of Examiniation Gastroscopy Gastroscopy Coloscopy Gastroscopy grant access to table "Type of Examination" and to table "Department/Room" to group medical personnel Figure 3 The group and inheritance concept of MS SQL Server. that only care personnel has access to column Department/Room (the department and room where the patient is located) whereas medical personnel only has access to column Type of Examination (indicating what examination has to take place with the patient). Neither members of group care personnel can access column Type of Examination nor can members of group medical personnel access entries in column Department/Room (the solid lines). By making a group a subgroup of another group, access rights can be inherited. Figure 3 in addition shows how the peculiar situation of medical personnel not having access to column Department/Room can be overcome by inheriting the access rights of group care personnel (the dashed lines). Users are assigned to groups according to their organizational roles in the hospital. The first constraint we have to consider for our real world environment is that the group assignments in a given hospital should not be changed, meaning that the access rights to existing tables for which no context-dependent access control is established should be left unchanged. On the other hand, for the tables in the database containing highly sensitive medical data (the patient records; the database containing the patient records is called MobiMedDB), context-dependent access control is to be established, implying that for none of the existing groups access is granted a priori to MobiMedDB. This is very important to note. Access rights are only given temporarily to users for a single access. Hence we generate a new group which we call MobiMedDBAccessGranted. No user and no group is assigned to the group MobiMedDBAccessGranted initially and permanently. To change the group membership of a user temporarily, we can use the SQL stored procedure named sp change group which exactly changes the group membership of a user. This is how we add context-dependency to access control decisions. After checking the need-to-know of a user to perform an access (Holbein et al. 1997), he or she receives temporary membership in the group MobiMedDBAccessGranted, the access is performed, and the group membership of the user is reset to the previous one. To perform the SQL stored procedure sp change group access rights of the SQL Server s administrator are needed. These could not be granted if the context-dependent access control itself were implemented as an SQL stored procedure. Hence we decided to implement it as a DLL (dynamic link li-

7 Realization of the Client-/Server-System 7 trigger application User (Application) access request 1 get request s results 7 2 get context information AW Administrator 2 2 DB query AWS DB (Workflow Data) Dynamic Link Library evaluate access rights using context information 4 and user role 3 get user role set user to group MobiMedDBAccessGranted perform DB query 6 reset user to old group MS SQL Server 7 7 MobiMed DB (Patient Data) Figure 4 How are access rights assigned to a user? brary) on the server. The DLL offers the only way to access the MobiMedDB database and can be linked to any application program. Hence, our technical solution for implementing a context-dependent access control for the database MobiMedDB on the given platform consists of the following steps (refer to Figure 4): 1. An application (started by a user or triggered by the workflow system) sends an access request to the server via the dynamic link library (DLL). 2. The DLL requests and receives from the AWS context information about the workflow of the patient whose record is intended to be accessed. 3. The DLL requests and receives role information about the user who is requesting the access from the MS SQL Server s registry. 4. Both, the context information and the role information are combined and the authority of the user to perform the access (depending on whether it is a read or a write access) to the patient record is evaluated. In the following it is assumed that the user has authority to perform the request (otherwise the request would be rejected at this point). 5. The user is set temporarily to group MobiMedDBAccessGranted. 6. The request (query) is performed on the database MobiMedDB.

8 8 Realization of a Context-Dependent Access Control Mechanism 7. The results of the query are delivered to the application. 8. The DLL resets the user to his/her previous group. Now we will present an access control trial that illustrates how success or failure of access requests depends on the current state of the health care process. For that reason, we consider a nurse s opportunity for misuse of MedicalHistory information. Herein we explain the influence of process states on the evaluation of an access request that corresponds to the need-to-know access right. We have to keep in mind that a person who is assigned to the nurse role is also assigned to all functional roles that correspond to the business transactions where the nurse role occurs. According to our example this is the business transaction called GastroCycle. That means, a nurse s need-toknow access rights concerning a patient s medical history are restricted to the GastroCycle within the Health Care process. We consider the following scenario: the user Maggi Smith was assigned to the Nurse role as well as the functional role that was defined according to the GastroCycle business transaction. Now, we assume Maggi Smith has activated the Nurse as well as GastroCycle roles and sends a request for read access concerning the MedicalHistory SamBrown information object to the access control system. This object is an instance of class MedicalHistory where the information owner is a person named Sam Brown. Obviously, the first step of evaluating the access request succeeds because an appropriate role based access right exists. However, within the access right there must be a context authentication for successful evaluation of the access request. In order to explain the possible evaluation results we consider the following four states of the workflow engine concerning the actual business transactions: 1. A Health Care process instance exists, GastroCycle is the current business transaction within this process and a person named Sam Brown acts as customer within the Health Care process. 2. A Health Care process instance exists and a person named Sam Brown is the customer but GastroCycle is not the current transaction within this process, i.e. must currently not be accomplished or has already been accomplished. 3. One or more Health Care process instances exist but Sam Brown is not the customer within one of these processes. 4. No Health Care process instance exists. Now it is important to note that although a role based access right exists the only case where the access request succeeds is the first. The access control trial shows that the nurse s opportunity for misuse of personal information can be restricted if a context authentication is part of the evaluation procedure. The context authentication ensures that the access request succeeds in case of a current need-to-know but not at any time.

9 Discussion 9 4 DISCUSSION Taking into account that the group MobiMedDBAccessGranted is an empty group in the MS SQL Server s registry, it is obvious that access to the MobiMedDB database can only be granted by the DLL described in the previous section. Although this is quite simple, we still have to discuss whether the presented implementation is feasible with respect to administration of the access control system and its concrete application. First of all, protecting the DLL properly is very important (the DLL knows the administrator log in procedure of the MS SQL Server to be able to perform the sp change group stored procedure). Since the DLL is kept on the server containing the database system rather than being distributed on several client platforms, protecting the DLL is not difficult. The only drawback is that whenever the system administrator password (the password of user sa ) of the MS SQL Server is changed, the DLL has to be recompiled by the system administrator. Though not being the most comfortable solution, its administration is not complicated. So we claim that the presented solution is both, simple and feasible. There is only one solution that we would prefer: the implementation of the DLL s functionality as an SQL stored procedure. However this is not possible given the constraints of the platform we consider. Considering the example presented at the end of the previous section, only in a few of many possible situations access is granted to a request. One can easily figure out that a very careful design of the workflow which delivers the context information is necessary in order to avoid errors in the access control mechanism. To be sufficiently cautious in order to handle possible design errors like incorrect context information for the need-to-know access control, one would have to implement an emergency mechanism to bypass the need-to-know principle, for instance by running a simple role based access control mechanism, which has to be recorded very carefully in a log file to keep its potential misuse ascertainable. 5 CONCLUSION We have presented a concrete implementation of context-dependent access control that realizes the need-to-know principle. Taking into account the constraints determined by a given platform (WindowsNT, MS SQL Server, MS Visual Basic, Action Technology workflow system) we have shown that a context-dependent access control indeed can be implemented for such an environment even if the required mechanisms are not built in these products. We have not considered questions of performance and user acceptance. These questions will be answered after installing a prototype system at the University Hospital of Basel and thoroughly analysing its benefits and drawbacks. We would like to thank Prof. Dr. K. Bauknecht for the support that made this work possible.

10 10 Realization of a Context-Dependent Access Control Mechanism 6 REFERENCES J.C. Francis, D.V. Polymeros, G.L. Lyberopoulos, V. Van de Keere, A. Elberse, P. Rogl, and L. Vezzoli. Project EXODUS: Experimental mobile multimedia deployment in atm networks Submitted to the Journal of the ACM. H.-R. Fischer, S. Teufel, Ch. Muggli, and M. Bichsel. Privacy and Efficiency of Mobile Medical Systems (MobiMed). Technical report, Bewilligtes Forschungsgesuch des Schwerpunktprogramms Informatikforschung SPP IuK, Modul: Demonstrator, Nr , R. Holbein. Secure Information Exchange in Organizations. PhD thesis, University of Zurich, Switzerland, Shaker Verlag, Aachen. R. Holbein and S. Teufel. A context authentication service for role based access control in distributed systems CARDS. In J.H.P. Eloff and S.H. von Solms, editors, Information Security the Next Decade IFIP/SEC 95. Chapman & Hall, London, UK, R. Holbein, S. Teufel, and K. Bauknecht. A formal security design approach for information exchange in organisations. In D.L. Sponner, S.A. Demurjian, and J.E. Dobson, editors, Proc. 9th IFIP TC11 Annual Working Conference on Database Security Chapman & Hall, London, UK, R. Holbein, S. Teufel, and K. Bauknecht. The use of business process models for security design in organisations. In S.K. Katsikas and D. Gritzalis, editors, Information Systems Security Facing the Information Society of the 21st Century IFIP/SEC 96. Chapman & Hall, London, UK, R. Holbein, S. Teufel, O. Morger, and K. Bauknecht. A comprehensive needto-know access control system and its application for medical information systems. In L. Yngström and J. Carlsen, editors, Information Security in Research and Business IFIP/SEC 97. Chapman & Hall, London, UK, R. Medina-Mora, T. Winograd, R. Flores, and F. Flores. The action workflow approach to workflow management technology. In Proceedings of the Conference on Computer-Supported Cooperative Work (CSCW 92), pages , Toronto, ACM Press. T.C. Ting, S.A. Demurjian, and M.-Y. Hu. Requirements, capabilities, and functionalities of user-role based security for an object-oriented design model. In C.E. Landwehr, editor, IFIP WG 11.3 Workshop on Database Security, pages , Sheperdstown, West Virginia, Elsevier. T.C. Ting, S.A. Demurjian, and M.-Y. Hu. A specification methodology for user-role based security in an object-oriented design model. In B.M. Thuraisingham and C.E. Landwehr, editors, IFIP WG th Working Conference on Database Security, pages , Simon Fraser University Burnaby, Vancouver, British Columbia, Elsevier.

11 Biography 11 7 BIOGRAPHY Ralph Holbein studied information science and computer science, receiving a Dr. phil. from the University of Zurich, Switzerland, in He is working in industry as an IT-Security Manager as well as a guest scientist at the University of Zurich, Switzerland. Major research interests: Security, Workflow Management Systems, and CSCW. Othmar Morger studied computer science and economics. From the University of Zurich, Switzerland, he received a lic. oec. publ. in He is working in industry as a Business Analyst as well as a guest scientist at the University of Zurich, Switzerland. Major research interests: CSCW, Workflow Management, Security, and Economical Aspects of Computer Science. Ulrich Nitsche is a lecturer at the Department of Electronics and Computer Science of the University of Southampton, United Kingdom. He was a research assistant at the University of Zurich, Switzerland, from 1996 to 1998 and a junior scientist at GMD TKT Darmstadt, Germany, from 1991 to Under a DAAD HSP II/AUFE fellowship he visited the University of Liège, Belgium, in He studied computer science and physics and received a Dr. phil. nat. from the University of Frankfurt, Germany, in March For a joint paper with Pierre Wolper he won the best student paper award of ACM PODC 97. Major research interests: Verification, Formal Methods, Security. Stephanie Teufel studied computer science at the Technical University of Berlin and the Swiss Federal Institute of Technology (ETH), Zurich. Assistant researcher at the Department of Computer Science between 1987 and 1991, where she received her Doctor s degree in May Between 1989 and 1990 teaching fellow and lecturer at the University of Wollongong, Australia. Since 1991 Senior Researcher and lecturer at the Department of Computer Science of the University of Zurich. Major research interests: Information Systems, Security, Information Management, and CSCW.

Internet Contextdependent Access Control and the Risk

Internet Contextdependent Access Control and the Risk Secure Access to Medical Data over the Internet Ulrich Ultes-Nitsche Department of Electronics and Computer Science University of Southampton Southampton, SO17 1BJ, United Kingdom uun@ecs.soton.ac.uk Stephanie

More information

Workflow Access Control from a Business Perspective

Workflow Access Control from a Business Perspective Workflow Access Control from a Business Perspective Dulce Domingos, António Rito-Silva 2, Pedro Veiga Informatics Department, University of Lisbon, Faculty of Sciences {dulce, pmv}@di.fc.ul.pt 2 INESC-ID

More information

Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2

Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2 Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2 Abubakar Sulaiman Gezawa 1, Ahmed Aliyu 2, Tong Yujun 3, Saifullahi Aminu Bello 4, Abubakar Ado 5 System

More information

Role Based Access Control Framework for Network Enterprises

Role Based Access Control Framework for Network Enterprises Role Based Access Control Framework for Network Enterprises Dan Thomsen, Dick O Brien, and Jessica Bogle Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113 thomsen@securecomputing.com

More information

An Object Oriented Role-based Access Control Model for Secure Domain Environments

An Object Oriented Role-based Access Control Model for Secure Domain Environments International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer

More information

Efficient Management of Tests and Defects in Variant-Rich Systems with pure::variants and IBM Rational ClearQuest

Efficient Management of Tests and Defects in Variant-Rich Systems with pure::variants and IBM Rational ClearQuest Efficient Management of Tests and Defects in Variant-Rich Systems with pure::variants and IBM Rational ClearQuest Publisher pure-systems GmbH Agnetenstrasse 14 39106 Magdeburg http://www.pure-systems.com

More information

Quality Control in Spreadsheets: A Software Engineering-Based Approach to Spreadsheet Development

Quality Control in Spreadsheets: A Software Engineering-Based Approach to Spreadsheet Development Quality Control in Spreadsheets: A Software Engineering-Based Approach to Spreadsheet Development Kamalasen Rajalingham, David Chadwick, Brian Knight, Dilwyn Edwards Information Integrity Research Centre

More information

Dynamism and Data Management in Distributed, Collaborative Working Environments

Dynamism and Data Management in Distributed, Collaborative Working Environments Dynamism and Data Management in Distributed, Collaborative Working Environments Alexander Kipp 1, Lutz Schubert 1, Matthias Assel 1 and Terrence Fernando 2, 1 High Performance Computing Center Stuttgart,

More information

CERN, Information Technology Department alberto.pace@cern.ch

CERN, Information Technology Department alberto.pace@cern.ch Identity Management Alberto Pace CERN, Information Technology Department alberto.pace@cern.ch Computer Security The present of computer security Bugs, Vulnerabilities, Known exploits, Patches Desktop Management

More information

Stellar Active Directory Manager

Stellar Active Directory Manager Stellar Active Directory Manager What is the need of Active Directory Manager? Every organization uses Active Directory Services (ADMS) to manage the users working in the organization. This task is mostly

More information

Adi Armoni Tel-Aviv University, Israel. Abstract

Adi Armoni Tel-Aviv University, Israel. Abstract Informing Science Data Security Volume 5 No 1, 2002 Data Security Management in Distributed Computer Systems Adi Armoni Tel-Aviv University, Israel armonia@colman.ac.il Abstract This research deals with

More information

Active Directory User Management System (ADUMS)

Active Directory User Management System (ADUMS) Active Directory User Management System (ADUMS) Release 2.9.3 User Guide Revision History Version Author Date Comments (MM/DD/YYYY) i RMA 08/05/2009 Initial Draft Ii RMA 08/20/09 Addl functionality and

More information

PKI Adoption Case Study (for the OASIS PKIA TC) ClinPhone Complies with FDA Regulations Using PKIbased Digital Signatures

PKI Adoption Case Study (for the OASIS PKIA TC) ClinPhone Complies with FDA Regulations Using PKIbased Digital Signatures PKI Adoption Case Study (for the OASIS PKIA TC) ClinPhone Complies with FDA Regulations Using PKIbased Digital Signatures PKI Project Title Digital Signatures for ClinPhone Organisation concerned ClinPhone

More information

BillQuick Agent 2010 Getting Started Guide

BillQuick Agent 2010 Getting Started Guide Time Billing and Project Management Software Built With Your Industry Knowledge BillQuick Agent 2010 Getting Started Guide BQE Software, Inc. 2601 Airport Drive Suite 380 Torrance CA 90505 Support: (310)

More information

Design and Implementation of RMP - A Virtual Electronic Market Place

Design and Implementation of RMP - A Virtual Electronic Market Place Design and Implementation of RMP - A Virtual Electronic Market Place 1 Introduction Susanne Boll*, Wolfgang Klas*, Bernard Battaglin** Electronic commerce is one of the currently most exciting and fast

More information

A WEB-BASED PORTAL FOR INFORMATION SECURITY EDUCATION

A WEB-BASED PORTAL FOR INFORMATION SECURITY EDUCATION A WEB-BASED PORTAL FOR INFORMATION SECURITY EDUCATION JOHAN VAN NIEKERK and ROSSOUW VON SOLMS Port Elizabeth Technikon, johanvn@petech.ac.za rossouw@petech.ac.za Key words: Abstract: Information Security,

More information

Computer Information Systems (CIS)

Computer Information Systems (CIS) Computer Information Systems (CIS) CIS 113 Spreadsheet Software Applications Prerequisite: CIS 146 or spreadsheet experience This course provides students with hands-on experience using spreadsheet software.

More information

DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS

DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS Manying Qiu, Virginia State University, mqiu@vsu.edu Steve Davis, Clemson University, davis@clemson.edu ABSTRACT People considering improvements in database

More information

INFORMATION SECURITY AWARENESS: Baseline Education and Certification

INFORMATION SECURITY AWARENESS: Baseline Education and Certification INFORMATION SECURITY AWARENESS: Baseline Education and Certification LINDIE DU PLESSIS AND ROSSOUW VON SOLMS Port Elizabeth Technikon, s9944977@student.petech.ac.za rossouw@petech.ac.za Key words: Information

More information

DEVELOPMENT OF DATABASE FOR EXPERT SYSTEMS OF INFORMATION SECURITY AUDITING

DEVELOPMENT OF DATABASE FOR EXPERT SYSTEMS OF INFORMATION SECURITY AUDITING Computer Modelling and New Technologies, 2011, Vol.15, No.4, 52 57 Transport and Telecommunication Institute, Lomonosov 1, LV-1019, Riga, Latvia DEVELOPMENT OF DATABASE FOR EXPERT SYSTEMS OF INFORMATION

More information

A Multi-Agent Approach to a Distributed Schedule Management System

A Multi-Agent Approach to a Distributed Schedule Management System UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in

More information

Roles and scope of Responsibility Within the RBAC Framework

Roles and scope of Responsibility Within the RBAC Framework Second Role Based Access Control Workshop, George Mason University, Virginia USA, November 6-7, 1997 Reconciling Role Based Management and Role Based Access Control Emil Lupu and Morris Sloman Imperial

More information

Ontology-Based Discovery of Workflow Activity Patterns

Ontology-Based Discovery of Workflow Activity Patterns Ontology-Based Discovery of Workflow Activity Patterns Diogo R. Ferreira 1, Susana Alves 1, Lucinéia H. Thom 2 1 IST Technical University of Lisbon, Portugal {diogo.ferreira,susana.alves}@ist.utl.pt 2

More information

INTEGRATION OF DIGITAL SIGNATURES INTO THE EUROPEAN BUSINESS REGISTER. Abstract:

INTEGRATION OF DIGITAL SIGNATURES INTO THE EUROPEAN BUSINESS REGISTER. Abstract: INTEGRATION OF DIGITAL SIGNATURES INTO THE EUROPEAN BUSINESS REGISTER Helmut Kurth Industrieanlagen Betriebsgesellschaft mbh Einsteinstr. 20 D-85521 Ottobrunn, Germany kurth@iabg.de Abstract: In the INFOSEC

More information

Enterprise Integration: operational models of business processes and workflow systems *

Enterprise Integration: operational models of business processes and workflow systems * Enterprise Integration: operational models of business processes and workflow systems. 1 Enterprise Integration: operational models of business processes and workflow systems * G.Bruno 1, C.Reyneri 2 and

More information

Foundations for Systems Development

Foundations for Systems Development Foundations for Systems Development ASSIGNMENT 1 Read this assignment introduction. Then, read Chapter 1, The Systems Development Environment, on pages 2 25 in your textbook. What Is Systems Analysis and

More information

CHAPTER 6 DATABASE MANAGEMENT SYSTEMS. Learning Objectives

CHAPTER 6 DATABASE MANAGEMENT SYSTEMS. Learning Objectives CHAPTER 6 DATABASE MANAGEMENT SYSTEMS Management Information Systems, 10 th edition, By Raymond McLeod, Jr. and George P. Schell 2007, Prentice Hall, Inc. 1 Learning Objectives Understand the hierarchy

More information

Web. Studio. Visual Studio. iseries. Studio. The universal development platform applied to corporate strategy. Adelia. www.hardis.

Web. Studio. Visual Studio. iseries. Studio. The universal development platform applied to corporate strategy. Adelia. www.hardis. Web Studio Visual Studio iseries Studio The universal development platform applied to corporate strategy Adelia www.hardis.com The choice of a CASE tool does not only depend on the quality of the offer

More information

Advanced Knowledge Acquisition System

Advanced Knowledge Acquisition System Advanced Knowledge Acquisition System Knowledge is Power Introduction 4th Wave, a leading European E-commerce solution provider, has created the unique ADVANCED KNOWLEDGE ACQUISITION SYSTEM -. This innovative

More information

Semantic Analysis of Business Process Executions

Semantic Analysis of Business Process Executions Semantic Analysis of Business Process Executions Fabio Casati, Ming-Chien Shan Software Technology Laboratory HP Laboratories Palo Alto HPL-2001-328 December 17 th, 2001* E-mail: [casati, shan] @hpl.hp.com

More information

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT Solution in Detail NetWeaver BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING NetWeaver IDENTITY MANAGEMENT Identity management today presents organizations with a host of challenges. System landscapes

More information

The Role of Computers in Synchronous Collaborative Design

The Role of Computers in Synchronous Collaborative Design The Role of Computers in Synchronous Collaborative Design Wassim M. Jabi, The University of Michigan Theodore W. Hall, Chinese University of Hong Kong Abstract In this paper we discuss the role of computers

More information

Apache Web Server Execution Tracing Using Third Eye

Apache Web Server Execution Tracing Using Third Eye Apache Web Server Execution Tracing Using Third Eye Raimondas Lencevicius Alexander Ran Rahav Yairi Nokia Research Center, 5 Wayside Road, Burlington, MA 01803, USA Raimondas.Lencevicius@nokia.com Alexander.Ran@nokia.com

More information

Configuration & Build Management

Configuration & Build Management Object-Oriented Software Engineering Using UML, Patterns, and Java Configuration & Build Management Outline of the Lecture Purpose of Software Configuration Management (SCM) Some Terminology Software Configuration

More information

Exploring Organizational Security and Auditing

Exploring Organizational Security and Auditing Exploring Organizational Security and Auditing Contents Organizational security and audit... 3 Scenario 1: SQL Server audit... 3 Scenario 2: Contained Database Authentication...16 Scenario 3: User Defined

More information

Page 1. Outline of the Lecture. What is Software Configuration Management? Why Software Configuration Management?

Page 1. Outline of the Lecture. What is Software Configuration Management? Why Software Configuration Management? Books: Software Configuration Management 1. B. Bruegge and A. H. Dutoit, Object-Oriented Software Engineering: Using UML, Patterns, and Java (Chapter 13) Outline of the Lecture Purpose of Software Configuration

More information

Novo Knowledge Base Software

Novo Knowledge Base Software Customer Support & Knowledge Management Solutions Novo Solutions for KNOWLEDGE MANAGEMENT What Will It Do For You? Better & Faster Customer Support: provides quicker problem resolution and 24 x 7 Web customer

More information

Microsoft SharePoint 2010 Overview

Microsoft SharePoint 2010 Overview Course Code: M10174 Vendor: Microsoft Course Overview Duration: 5 RRP: 1,980 Configuring and Administering Microsoft SharePoint 2010 Overview This five day course teaches delegates how to install, configure

More information

Course: 10174B: Configuring and Administering Microsoft SharePoint 2010

Course: 10174B: Configuring and Administering Microsoft SharePoint 2010 Course: 10174B: Configuring and Administering Microsoft SharePoint 2010 Description: This five-day instructor-led course teaches students how to install, configure, and administer Microsoft SharePoint

More information

Chapter 1 Scenario 1: Acme Corporation

Chapter 1 Scenario 1: Acme Corporation Chapter 1 Scenario 1: Acme Corporation In This Chapter Description of the Customer Environment page 18 Introduction to Deploying Pointsec PC page 20 Prepare for Deployment page 21 Install Pointsec PC page

More information

Some Methodological Clues for Defining a Unified Enterprise Modelling Language

Some Methodological Clues for Defining a Unified Enterprise Modelling Language Some Methodological Clues for Defining a Unified Enterprise Modelling Language Michaël Petit University of Namur, Belgium, mpe@info.fundp.ac.be Abstract The need for a Unified Enterprise Modelling Language

More information

COMPONENTS in a database environment

COMPONENTS in a database environment COMPONENTS in a database environment DATA data is integrated and shared by many users. a database is a representation of a collection of related data. underlying principles: hierarchical, network, relational

More information

Feasibility Study into the use of Service Oriented Architecture within the Atlantis University Portal

Feasibility Study into the use of Service Oriented Architecture within the Atlantis University Portal Feasibility Study into the use of Service Oriented Architecture within the Atlantis University Portal F.Mountford and A.D.Phippen Network Research Group, University of Plymouth, Plymouth, United Kingdom

More information

Foundation ACTIVE DIRECTORY AND MICROSOFT EXCHANGE PROVISIONING FOR HEALTHCARE PROVIDERS HEALTHCARE: A UNIQUELY COMPLEX ENVIRONMENT

Foundation ACTIVE DIRECTORY AND MICROSOFT EXCHANGE PROVISIONING FOR HEALTHCARE PROVIDERS HEALTHCARE: A UNIQUELY COMPLEX ENVIRONMENT Foundation ACTIVE DIRECTORY AND MICROSOFT EXCHANGE PROVISIONING FOR HEALTHCARE PROVIDERS The promise of reduced administrative costs and improved caregiver satisfaction associated with user provisioning

More information

Advantages of a Compact Semantic Meta Model

Advantages of a Compact Semantic Meta Model Advantages of a Compact Semantic Meta Model J.H. ter Bekke Department of Information Systems Delft University of Technology Zuidplantsoen 4, 2628 BZ Delft, The Netherlands E-mail: j.h.terbekke@is.twi.tudelft.nl

More information

A REFERENCE FRAMEWORK FOR SECURITY IN ENTERPRISE RESOURCE PLANNING (ERP) SYSTEMS MANFRED PAUL HERTENBERGER THESIS

A REFERENCE FRAMEWORK FOR SECURITY IN ENTERPRISE RESOURCE PLANNING (ERP) SYSTEMS MANFRED PAUL HERTENBERGER THESIS A REFERENCE FRAMEWORK FOR SECURITY IN ENTERPRISE RESOURCE PLANNING (ERP) SYSTEMS by MANFRED PAUL HERTENBERGER THESIS submitted in the fulfillment of the requirements for the degree PHILOSOPHIAE DOCTOR

More information

A CASE FOR INFORMATION OWNERSHIP IN ERP SYSTEMS TO ENHANCE SECURITY

A CASE FOR INFORMATION OWNERSHIP IN ERP SYSTEMS TO ENHANCE SECURITY A CASE FOR INFORMATION OWNERSHIP IN ERP SYSTEMS TO ENHANCE SECURITY Prof. S.H. von Solms, M.P. Hertenberger Rand Afrikaans University, Johannesburg, South Africa Prof. S.H. von Solms Email address: basie@rau.ac.za

More information

Business-Driven, Compliant Identity Management

Business-Driven, Compliant Identity Management Solution in Detail NetWeaver NetWeaver Identity Business-Driven, Compliant Identity Using NetWeaver Identity Managing users in heterogeneous IT landscapes presents many challenges for organizations. System

More information

Swirl. Multiplayer Gaming Simplified. CS4512 Systems Analysis and Design. Assignment 1 2010. Marque Browne 0814547. Manuel Honegger - 0837997

Swirl. Multiplayer Gaming Simplified. CS4512 Systems Analysis and Design. Assignment 1 2010. Marque Browne 0814547. Manuel Honegger - 0837997 1 Swirl Multiplayer Gaming Simplified CS4512 Systems Analysis and Design Assignment 1 2010 Marque Browne 0814547 Manuel Honegger - 0837997 Kieran O' Brien 0866946 2 BLANK MARKING SCHEME 3 TABLE OF CONTENTS

More information

B.Sc (Computer Science) Database Management Systems UNIT-V

B.Sc (Computer Science) Database Management Systems UNIT-V 1 B.Sc (Computer Science) Database Management Systems UNIT-V Business Intelligence? Business intelligence is a term used to describe a comprehensive cohesive and integrated set of tools and process used

More information

B.Com(Computers) II Year RELATIONAL DATABASE MANAGEMENT SYSTEM Unit- I

B.Com(Computers) II Year RELATIONAL DATABASE MANAGEMENT SYSTEM Unit- I B.Com(Computers) II Year RELATIONAL DATABASE MANAGEMENT SYSTEM Unit- I 1 1. What is Data? A. Data is a collection of raw information. 2. What is Information? A. Information is a collection of processed

More information

The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform

The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform Technical Discussion David Churchill CEO DraftPoint Inc. The information contained in this document represents the current

More information

Active Directory Integration Manual

Active Directory Integration Manual Active Directory Integration Manual Fast and easy roll-out of BackupAgent platforms using Active Directory and web-panels 1. Online Backup for hosters This whitepaper describes the unique and valuable

More information

Encore Software Solutions (V3) Identity Lifecycle Management and Federated Security Suite (ILM/FSS) Overview and Technical Requirements

Encore Software Solutions (V3) Identity Lifecycle Management and Federated Security Suite (ILM/FSS) Overview and Technical Requirements Encore Software Solutions (V3) Identity Lifecycle Management and Federated Security Suite (ILM/FSS) Overview and Technical Requirements Encore Software Solutions (V3) provides a holistic Identity Lifecycle

More information

Draft Resolutions Proposed by the Website Working Group. Proposer: Information and Privacy Commissioner for British Columbia

Draft Resolutions Proposed by the Website Working Group. Proposer: Information and Privacy Commissioner for British Columbia 30 th International Conference of Data Protection and Privacy Commissioners Strasbourg, 17 October 2008 Draft Resolutions Proposed by the Website Working Group Proposer: Information and Privacy Commissioner

More information

Windows Authentication on Microsoft SQL Server

Windows Authentication on Microsoft SQL Server Windows Authentication on Microsoft SQL Server Introduction Microsoft SQL Server offers two types of security authentication: SQL Server authentication and Windows authentication. SQL Server authentication

More information

Aspects of Lyee Configuration Management

Aspects of Lyee Configuration Management Aspects of Lyee Configuration Management Volker GRUHN, Raschid IJIOUI, Dirk PETERS, Robert QUECK, Clemens SCHÄFER Chair for Applied Telematics / e-business, Universität Leipzig, Klostergasse 3, D-04109

More information

A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang

A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang ABSTRACT In recent years, many large organizations have used the Role Based Access Control (RBAC) Workflow

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Integrating Databases, Objects and the World-Wide Web for Collaboration in Architectural Design

Integrating Databases, Objects and the World-Wide Web for Collaboration in Architectural Design Integrating Databases, Objects and the World-Wide Web for Collaboration in Architectural Design Wassim Jabi, Assistant Professor Department of Architecture University at Buffalo, State University of New

More information

Project management integrated into Outlook

Project management integrated into Outlook Project management integrated into Outlook InLoox PM 7.x off-line operation An InLoox Whitepaper Published: October 2011 Copyright: 2011 InLoox GmbH. You can find up-to-date information at http://www.inloox.com

More information

The Application of Intrusion Detection Systems in a Forensic Environment. (Extended Abstract)

The Application of Intrusion Detection Systems in a Forensic Environment. (Extended Abstract) The Application of Intrusion Detection Systems in a Forensic Environment (Extended Abstract) Peter Stephenson Netigy Corporation, San Jose, CA And Oxford Brookes University, School of Computing and Mathematical

More information

Course 10174B: Configuring and Administering Microsoft SharePoint 2010

Course 10174B: Configuring and Administering Microsoft SharePoint 2010 www.etidaho.com (208) 327-0768 Course 10174B: Configuring and Administering Microsoft SharePoint 2010 5 Days About this Course This five-day instructor-led course teaches students how to install, configure,

More information

Database Concepts. Database & Database Management System. Application examples. Application examples

Database Concepts. Database & Database Management System. Application examples. Application examples Database & Database Management System Database Concepts Database = A shared collection of logically related (and a description of this data), designed to meet the information needs of an organization.

More information

Business Internet Banking System Customers User Guide

Business Internet Banking System Customers User Guide Business Internet Banking System Customers User Guide Version 1.1 Table of Contents Table of Contents... 2 Introduction... 3 Using Business Internet Banking... 4 Accessing the Website... 4 Logging onto

More information

SEER Enterprise Shared Database Administrator s Guide

SEER Enterprise Shared Database Administrator s Guide SEER Enterprise Shared Database Administrator s Guide SEER for Software Release 8.2 SEER for IT Release 2.2 SEER for Hardware Release 7.3 March 2016 Galorath Incorporated Proprietary 1. INTRODUCTION...

More information

Understanding Security and Rights in SAP BusinessObjects Business Intelligence 4.1

Understanding Security and Rights in SAP BusinessObjects Business Intelligence 4.1 Understanding Security and Rights in SAP BusinessObjects Business Intelligence 4.1 Session Code*: 0313 Greg Wcislo Disclaimer This presentation outlines our general product direction and should not be

More information

A Study on User Access Control Method using Multi-Factor Authentication for EDMS

A Study on User Access Control Method using Multi-Factor Authentication for EDMS , pp.327-334 http://dx.doi.org/10.14257/ijsia.2013.7.6.33 A Study on User Access Control Method using Multi-Factor Authentication for EDMS Keunwang Lee 1* 1 Dept.of Multimedia Science, Chungwoon University

More information

DATABASE DESIGN AND IMPLEMENTATION II SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO. Sault College

DATABASE DESIGN AND IMPLEMENTATION II SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO. Sault College -1- SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO Sault College COURSE OUTLINE COURSE TITLE: CODE NO. : SEMESTER: 4 PROGRAM: PROGRAMMER (2090)/PROGRAMMER ANALYST (2091) AUTHOR:

More information

GenericServ, a Generic Server for Web Application Development

GenericServ, a Generic Server for Web Application Development EurAsia-ICT 2002, Shiraz-Iran, 29-31 Oct. GenericServ, a Generic Server for Web Application Development Samar TAWBI PHD student tawbi@irit.fr Bilal CHEBARO Assistant professor bchebaro@ul.edu.lb Abstract

More information

Appropriate Technologies for the Design of the Portal for Microsoft Dynamics CRM at Initial Conditions

Appropriate Technologies for the Design of the Portal for Microsoft Dynamics CRM at Initial Conditions Appropriate Technologies for the Design of the Portal for Microsoft Dynamics CRM at Initial Conditions MATUS PECI PAVEL VAZAN VLADIMIR SURKA Institute of Applied Informatics, Automation and Mechatronics

More information

Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology

Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology UC DAVIS: OFFICE OF THE VICE PROVOST INFORMATION & EDUCATIONAL TECHNOLOGY Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology Background Unprecedented growth and an

More information

On- and Off-Line User Interfaces for Collaborative Cloud Services

On- and Off-Line User Interfaces for Collaborative Cloud Services On- and Off-Line User Interfaces for Collaborative Cloud Services Wolfgang Stuerzlinger York University, Dept of Computer Science & Engineering 4700 Keele Street Toronto, Canada http://www.cse.yorku.ca/~wolfgang

More information

Role-Based Access Control Requirements Model with Purpose Extension

Role-Based Access Control Requirements Model with Purpose Extension Role-Based Access Control Requirements Model with Purpose Extension Faranak Farzad 1, Eric Yu Faculty of Information Studies University of Toronto, Canada Patrick C. K. Hung Faculty of Business and Information

More information

Configuring and Administering Microsoft SharePoint 2010 Course 10174B; 5 Days, Instructor-led

Configuring and Administering Microsoft SharePoint 2010 Course 10174B; 5 Days, Instructor-led Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Configuring and Administering Microsoft SharePoint 2010 Course 10174B; 5

More information

REQUIREMENTS FOR THE WORKFLOW-BASED SUPPORT OF RELEASE MANAGEMENT PROCESSES IN THE AUTOMOTIVE SECTOR

REQUIREMENTS FOR THE WORKFLOW-BASED SUPPORT OF RELEASE MANAGEMENT PROCESSES IN THE AUTOMOTIVE SECTOR REQUIREMENTS FOR THE WORKFLOW-BASED SUPPORT OF RELEASE MANAGEMENT PROCESSES IN THE AUTOMOTIVE SECTOR Ulrich Bestfleisch, Joachim Herbst DaimlerChrysler AG Research and Technology Data and Process Management

More information

The PaperCept Journal Submission and Review Management System

The PaperCept Journal Submission and Review Management System The PaperCept Journal Submission and Review Management System Configuration and User Guide Huibert Kwakernaak PaperCept Inc. March 2013 1 Contents 1 Features... 1 1.1 People Database... 1 1.2 Users...

More information

Citrix Password Manager Using the Account Self-Service Feature. Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition

Citrix Password Manager Using the Account Self-Service Feature. Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition Citrix Password Manager Using the Account Self-Service Feature Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition 2 Citrix Password Manager - Account Self-Service Copyright

More information

Dögel IT-Management. Service catalogue Q3-2009

Dögel IT-Management. Service catalogue Q3-2009 Dögel IT-Management Service catalogue Q3-2009 Our goal is your profit Dögel IT-Management is a young and rapid growing enterprise, which is focused on modern software technology. Since its establishment

More information

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

More information

CONFIGURATION AND APPLICATIONS DEPLOYMENT IN WEBSPHERE 6.1

CONFIGURATION AND APPLICATIONS DEPLOYMENT IN WEBSPHERE 6.1 CONFIGURATION AND APPLICATIONS DEPLOYMENT IN WEBSPHERE 6.1 BUSINESS LOGIC FOR TRANSACTIONAL EJB ARCHITECTURE JAVA PLATFORM Last Update: May 2011 Table of Contents 1 INSTALLING WEBSPHERE 6.1 2 2 BEFORE

More information

Schema Evolution in SQL-99 and Commercial (Object-)Relational DBMS

Schema Evolution in SQL-99 and Commercial (Object-)Relational DBMS Schema Evolution in SQL-99 and Commercial (Object-)Relational DBMS Can Türker Swiss Federal Institute of Technology (ETH) Zurich Institute of Information Systems, ETH Zentrum CH 8092 Zurich, Switzerland

More information

CHI DATABASE VISUALIZATION

CHI DATABASE VISUALIZATION CHI DATABASE VISUALIZATION Niko Vegt Introduction The CHI conference is leading within the field of interaction design. Thousands of papers are published for this conference in an orderly structure. These

More information

Chapter 8 Approaches to System Development

Chapter 8 Approaches to System Development Systems Analysis and Design in a Changing World, sixth edition 8-1 Chapter 8 Approaches to System Development Table of Contents Chapter Overview Learning Objectives Notes on Opening Case and EOC Cases

More information

Aerospace Software Engineering

Aerospace Software Engineering 16.35 Aerospace Software Engineering Offered by the Dept. of Aero/Astro, MIT Autumn 2002 Instructors: Prof. I. K. Lundqvist Prof. N. G. Leveson Guest lecturers: Prof. K. Vicente R. Racine G. Romanski M.

More information

Systematization of Requirements Definition for Software Development Processes with a Business Modeling Architecture

Systematization of Requirements Definition for Software Development Processes with a Business Modeling Architecture Systematization of Requirements Definition for Software Development Processes with a Business Modeling Architecture Delmir de Azevedo Junior 1 and Renato de Campos 2 1 Petrobras University, Republican

More information

To introduce software process models To describe three generic process models and when they may be used

To introduce software process models To describe three generic process models and when they may be used Software Processes Objectives To introduce software process models To describe three generic process models and when they may be used To describe outline process models for requirements engineering, software

More information

Dell InTrust 11.0. Auditing and Monitoring Microsoft Windows

Dell InTrust 11.0. Auditing and Monitoring Microsoft Windows 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Archetype-Based Knowledge Management for Semantic Interoperability of Electronic Health Records

Archetype-Based Knowledge Management for Semantic Interoperability of Electronic Health Records Medical Informatics in a United and Healthy Europe K.-P. Adlassnig et al. (Eds.) IOS Press, 2009 2009 European Federation for Medical Informatics. All rights reserved. doi:10.3233/978-1-60750-044-5-1007

More information

Help Desk Management System for PC Troubleshooting

Help Desk Management System for PC Troubleshooting Volume 7 No.7, August 2014 www.ijais.org Help Desk Management System for PC Troubleshooting Safiya Al-Sharji Student, Computer Engineering Caledonian College of Engineering Muscat, Oman Ali Al-Mahruqi

More information

Keywords Aspect-Oriented Modeling, Rule-based graph transformations, Aspect, pointcuts, crosscutting concerns.

Keywords Aspect-Oriented Modeling, Rule-based graph transformations, Aspect, pointcuts, crosscutting concerns. Volume 4, Issue 5, May 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Functional and Non-Functional

More information

Integrity 10. Curriculum Guide

Integrity 10. Curriculum Guide Integrity 10 Curriculum Guide Live Classroom Curriculum Guide Integrity 10 Workflows and Documents Administration Training Integrity 10 SCM Administration Training Integrity 10 SCM Basic User Training

More information

CS 565 Business Process & Workflow Management Systems

CS 565 Business Process & Workflow Management Systems CS 565 Business Process & Workflow Management Systems Professor & Researcher Department of Computer Science, University of Crete & ICS-FORTH E-mail: dp@csd.uoc.gr, kritikos@ics.forth.gr Office: K.307,

More information

DOCUMENT MANAGEMENT IN CONTEXT OF COLLABORATIVE SYSTEMS

DOCUMENT MANAGEMENT IN CONTEXT OF COLLABORATIVE SYSTEMS DOCUMENT MANAGEMENT IN CONTEXT OF COLLABORATIVE SYSTEMS Abstract Sergiu Jecan 1 Costin Aurelian-Răzvan 2 Maria Iulia Laba 3 In this paper we will present the implementation aspects of a document management

More information

The CVS-Server Case Study: A Formalized Security Architecture

The CVS-Server Case Study: A Formalized Security Architecture The CVS-Server Case Study: A Formalized Security Architecture Extended Abstract Achim D. Brucker, Frank Rittinger, and Burkhart Wolff {brucker,rittinge,wolff}@informatik.uni-freiburg.de 1 Introduction

More information

Concepts of Database Management Seventh Edition. Chapter 7 DBMS Functions

Concepts of Database Management Seventh Edition. Chapter 7 DBMS Functions Concepts of Database Management Seventh Edition Chapter 7 DBMS Functions Objectives Introduce the functions, or services, provided by a DBMS Describe how a DBMS handles updating and retrieving data Examine

More information

Peer-to-Peer: an Enabling Technology for Next-Generation E-learning

Peer-to-Peer: an Enabling Technology for Next-Generation E-learning Peer-to-Peer: an Enabling Technology for Next-Generation E-learning Aleksander Bu lkowski 1, Edward Nawarecki 1, and Andrzej Duda 2 1 AGH University of Science and Technology, Dept. Of Computer Science,

More information

Department of Information Technology Active Directory Audit Final Report. August 2008. promoting efficient & effective local government

Department of Information Technology Active Directory Audit Final Report. August 2008. promoting efficient & effective local government Department of Information Technology Active Directory Audit Final Report August 2008 promoting efficient & effective local government Executive Summary Active Directory (AD) is a directory service by Microsoft

More information

Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications

Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &

More information