Through its open standards, the Internet set the foundation for

Size: px
Start display at page:

Download "Through its open standards, the Internet set the foundation for"

Transcription

1 F E A T U R E Secure itraets are fouded o the protectio of logical resources accessible i corporate eterprises. A ROLE- BASED ACCESS CONTROL FOR INTRANET SECURITY The proposed I-RBAC, ZAHIR TARI AND SHUN-WU CHAN Royal Melboure Istitute of Techology role-based access cotrol for itraet security, offers efficiet security aageet based o varied levels of role authorizatios. Through its ope stadards, the Iteret set the foudatio for the global couity ad access to resources that illios of coputer users ejoy today. The beefits that accrue to the global couity fro this approach are also available to corporate eterprises through itraets, private iforatio etworks that use Iteret software ad stadards but are ot accessible fro the Iteret-at-large by the geeral public. A itraet uses the TCP/IP protocol for both wide-area ad local-area iforatio trasport, as well as HTTP, SMTP, ad other ope Iteret-based stadards to ove iforatio fro cliets to servers. 1 A itraet architecture for a corporate eterprise typically ivolves a set of servers (such as a SQL server, Web server, ad database server) itercoected withi a local area etwork. I the global couity, uresolved issues of Iteret security ihibit people fro, for exaple, eterig their credit card ubers to purchase goods ad services. Withi corporate eterprises usig itraets, security is usually the uber oe cocer. There are three basic threat areas: storage, access, ad trasfer. Storage security refers /97/$ IEEE IEEE INTERNET COMPUTING 24

2 A C C E S S C O N T R O L to the protectio of physical resources, which ca be located i oe or ore servers. Access security cocers autheticatio ad access to the (logical) resources available i the itraet. Trasfer security relates to the protectio of iforatio i trasit. It ivolves various ecryptio techiques such as syetric ad asyetric keys, ecrypted ad decrypted essages, ad digital sigatures ad certificates. This article describes the basic eleets of a role-based access cotrol fraework we have developed, aely I- RBAC. We also discuss its ipleetatio. I-RBAC protects a itraet fro itruders. It is desiged aroud two cetral issues: deteriig if a etwork object has appropriate perissios to access itraet resources; ad deteriig how to check the perissios of a etwork object. PERMISSION GRANTING Our approach to the proble of gratig user perissios assigs roles that deterie the scope of access that etwork objects have to the itraet s resources ad privileges. Itraet adiistrators ca create roles accordig to the job fuctios perfored i the orgaizatios. They ca the grat perissios essetially, access authorizatios to these roles, ad assig etwork objects to the roles o the basis of the etwork objects resposibilities. A etwork object refers to a etity of a itraet that either uses, cosues, or provides a service. Over the past few years, there have bee several proposals for role-based access cotrol. Soe have suggested extesios to existig cotrol, such as adatory access cotrol. 2-6 Others have discussed specific architectures, such as a threetier architecture, for ipleetig role-based access cotrol o diverse platfors. 7 INTRANET ENVIRONMENTS I-RBAC access cotrol deals specifically with itraet eviroets. Role-based access cotrol for itraets differs fro existig access cotrols o several poits. First, a role ay refer either to local or global perissios withi a itraet. Local perissios are a set of privileges that a etwork object has o the differet etwork objects available i idividual servers. Global perissios are a set of privileges o the servers of the whole itraet. The ai differece betwee local ad global perissios is i the graularity of the perissio set, which ca be o either etwork objects or servers. Secod, local roles refer to specialized roles that are cocered with local perissios o etwork objects i idividual servers, whereas global roles refer to ordiary eterprise roles that have global perissios o a etwork server. For exaple, local roles, withi a Web server, ca be Web Adiistrator, Web Publisher, Web Editor, ad so o. These local roles ay have their job fuctioality specialized to perfor specific tasks withi this Web server. The local perissios related to these local roles ay be the privileges to Read, Write, Modify, ad Create ay Web page withi the Web server. A global role i a corporate eterprise ay cosist of Geeral Maager, Departet Maager, Supervisor, ad ordiary eployee. The global role Supervisor ay be authorized with global perissios to access the itraet s resources with differet local roles i differet servers. Third, to allow flexible eforceet of security policies withi a itraet eviroet, we itroduce two types of role hierarchy. Local role hierarchies describe the perissios of local or global etwork objects to use idividual servers resources. (We will explai the differeces betwee these objects later.) The global role hierarchy relates to resource accessibility across the whole itraet. Each type of hierarchy provides a appropriate echais to eforce differet policies: local policies for idividual servers ad global policies for the etire itraet. Fially, to eforce global security policies efficietly, we propose a replicatio echais that icreases the availability of global security database iforatio for checkig etwork object authorizatios. RATIONALE FOR ROLE-BASED ACCESS Three ai reasos justify a role-based approach to eforce local ad global security policies withi a itraet. Siplified authorizatio aageet: A role hierarchy odel siplifies the task of aagig the eterprise itraet. User authorizatio ca be accoplished by separately (1) assigig users to existig roles, ad (2) assigig access privileges for objects to roles. This separatio has the advatage of siplifyig a itraet adiistrator s workload. Iagie that a prograer, assiged to a eployee role, is prooted to project leader. The itraet adiistrator assigs the project leader to a project role. With role-based access cotrol, the user gais the privileges that coe with project role assiget i additio to the privileges that accopay eployee role assiget. This avoids the ecessity of revokig authorizatio assiget directly betwee users ad objects. Least-privilege assiget: This priciple assigs the iiu privileges to a give object i order for the object to perfor specific operatios usig itraet resources. For exaple, a etwork user assiged a give role ca perfor oly the activities coected with the assiged privileges. This iiizes the potetial for daagig the itraet. Separatio of duties: This priciple requires that several etwork objects be ivoked to perfor a specific task. Thus, o idividual user ca isuse privileges by actig IEEE INTERNET COMPUTING SEPTEMBER OCTOBER

3 I N T R A N E T S Table 1. Network object represetatio. Network Perissio Access Object Property Value Set Cotrol List S1000 Nae Joh [-,C,D,R,W,-] j_ail, j_project S1000 Nae Joh [-,-,-,R,-,-] To PK130 Nae Mary [-,-,-,R,W,-] * aloe. For exaple, both a aager fro the aager role ad a accoutat fro the accoutat role ust be ivolved i the task of issuig a copay check. GENERIC ROLE-BASED ACCESS CONTROL We have desiged a role-based access cotrol for itraets, called I-RBAC. I this sectio we describe the I-RBAC cocepts ad their iterrelatioships i the cotext of itraet security eforceet. Write (W) lets a etwork object write or odify the cotet of a object state Execute (X) eables a etwork object to execute services (or operatios) of other etwork objects Table 1 lists a set of etwork objects, user objects i a corporate eterprise, with their correspodig Access Cotrol Lists ad the associated perissios. Privileges cotaied iside a perissio set are eclosed i square brackets. A idividual grated privilege is separated by a, while the sybol - deotes that the privilege is ot grated to a etwork object. Table 1 shows that the etwork object idetified by S1000 (called object idetity) has ultiple properties for exaple, ae ad age. Here we focus just o the ae property. S1000, which correspods to the user aed Joh, has bee grated Key Cocepts Network objects, perissios, ad roles are the three key cocepts. Network object. A etwork object defies a etwork etity that either stores data, perfors specific services, or represets a piece of etwork hardware. Etities ca be active, such as hua users, or iactive, such as a database server or Web server. A etwork object has a uique idetity i the etwork ad has a perissio, a property, ad a value associated with it. A perissio is a set of privileges that a object has i regard to the itraet s resources. A property is a set of attributes describig the characteristics of the etwork object (for exaple, the object s ae, IP address, ad creatio date). A value represets the object s state: the actual data value for each attribute of the object s property. Security iforatio ca be attached to a etwork object as a list, recordig a group of trusted etwork objects that are authorized to access other etwork objects. This is a Access Cotrol List (ACL). Perissio. A perissio is a set of attributes describig the kid of privileges that deterie what a etwork object ca do. The itraet adiistrator assigs perissios to a etwork object. For clarity, we assue that a perissio set cotais oly the followig privileges: Supervisor (S) grats all sorts of rights to a idividual etwork object or group of objects Create (C) allows the creatio or reaig of a etwork object Delete (D) eables the deletio of a etwork object Read (R) allows a etwork object to read the cotet of a object value all privileges except S ad X to access the etwork objects j ail (which is the etwork object represetig his e-ail) ad j project. oly the R privilege to access the etwork object To. Table 1 also shows that the etwork object Mary grats Read ad Write privileges to access ay available etwork object. Ay available object is represeted as a asterisk (*). Role. A role is a higher level represetatio of access cotrol. 2,3 It ca relate to either a sigle etwork object or a group of the ad is associated with differet perissios. All etwork objects assiged a give role share the sae privileges as the perissio associated with that role. All the privileges associated with roles ad their accessible etwork objects i the Access Cotrol Lists are recorded i a role table (Rtbl), which is used to check the authorizatios of users. A role table is a triple (r,p,l ), where r refers to role, p refers to perissio set, ad l is the ACL cotaiig accessible etwork objects. The role is specified as a row, while the perissio set ad the ACL are specified as colus. Table 2 is a exaple role table. Note that the roles Project, Adiistrator, ad Marketig are assiged to access etwork objects Mail-object (of the Mail Server) ad Fileobject (of the File Server) with differet perissio assiget, respectively. A user object assiged a Project role will have all privileges to access Mail-object i Mail-Server role, except the Supervisor privilege, ad have Read, Write, ad Execute privileges to access File objects i File-Server role. Role Hierarchy The otio of hierarchy of roles lets us ore clearly structure authorizatios. A role hierarchy will ultiately be aalogous to a orgaizatio s logical authority ad resposibil- SEPTEMBER OCTOBER IEEE INTERNET COMPUTING 26

4 A C C E S S C O N T R O L Table 2. A exaple of a role table. Role Perissio Set ACL Project [-,C,D,R,W,X] Mail-object Adiistrator [-,C,D,R,W,X] Mail-object Marketig [-,-,-,R,W,X] Mail-object Project [-,-,-,R,W,X] File-object Adiistrator [-,C,D,R,W,X] File-object Marketig [-,C,D,R,W,X] File-object Role cotais has ity structure. The higher positio a role has i the hierarchy, the ore privileges it has, ad vice versa. Accordig to Figure 1, a cobiatio of etwork objects with perissios are attached to a role. This cobiatio is called a category 6 ad it provides specificatios of (coplex) authorizatios withi itraet eviroets. Recall that i Table 2, the etwork object Mail-object had a list of perissios specified as [-,C,D,R,W,X] (that is, Mail-object.type = {C,D,R,W,X}). Furtherore, the role Project had two istaces of the category ivolvig Network-object ad Perissio: oe istace was (Mail-object, [-,C,D,R,W,X]) ad the other oe was (File-object [-,-,-,R,W,X]). The acyclic is a relatioship graph, defied betwee roles, defies the differet specializatio (or geeralizatio) of authorizatios withi a corporate eterprise. This eables further security specificatios o the differet perissios that etwork objects ca have. For exaple, r 1 is a r 2 (where r 1 is called a subrole ad r 2 is a superrole) eas that r 1 iherits all the perissios defied i r 2 ad itroduces additioal perissios o other etwork objects. Perissio has Network object type ae IPaddress Figure 1. Key eleets of the I-RBAC. Supervisig Iheritace. Figure 2 illustrates a exaple of role iheritace. I this acyclic graph represetatio, the ost juior prograer has a role. The Testig ad Aalyst roles are specializatios of a higher level, geeric role. A etwork object (i this case, a user) assiged as either Testig or Aalyst iherits all perissios. Siilarly, the Supervisig role iherits perissios fro both Testig ad Aalyst, ad it itroduces additioal perissios. We call such iheritace of ultiple roles ultiple iheritace. Multiple iheritace ay preset soe coflicts. For exaple, the Supervisig ay iherit differet perissios, say ACL 1 ad ACL 2, about the etwork object X fro the Testig ad Aalyst roles, respectively. Eve though there are differet perissios for X withi these two lists, the Supervisig will iherit ACL 1 ACL 2 perissios for X. Role iheritace i a role-based access cotrol provides a better way of structurig user authorizatios tha those access Testig Figure 2. A role iheritace hierarchy. Aalyst cotrols that do ot support role iheritace. However, a role hierarchy ca be probleatical regardig scope of iheritace of perissios ad the use of private perissios. 2 Private roles. Perissio assiget through iheritace siplifies overall itraet aageet, but the scope of perissio iheritace ust be liited. For exaple, certai IEEE INTERNET COMPUTING SEPTEMBER OCTOBER

5 I N T R A N E T S Testig ' Supervisig S 1 Supervisig S 2 Testig Aalyst T 1 Testig P 2 S 2 Aalyst P 3 Figure 3. Role iheritace hierarchy with private perissios. P 1 P 2 P P 3 privileges should ot flow dow fro the top of the role hierarchy to the botto. Liitig iheritace thus requires ew cocepts for subrole assiget. I Figure 3, the Supervisig role iherits authorizatios of the roles Testig ad Aalyst, ad itroduces additioal specific authorizatios. However, a Testig will probably wat the Supervisig to iherit oly soe of its perissios. For istace, a Testig does ot wat the Supervisig to access icoplete work files. To solve the proble of iheritig private perissios, i Figure 3 we itroduce Testig. This private role, which is also a subrole, cotais oly those private authorizatios of Testig. The Supervisig thus has oly liited authorizatios; its iheritace does ot reflect Testig authorizatios. Private-role hierarchy. Because private roles restrict perissios withi a hierarchy, the set of all private roles ay result i a ew, private-role hierarchy. This is useful wheever orgaizatios wat to liit the iheritace of perissios. Figure 4 illustrates a private-role hierarchy, depictig seve roles that could be assiged to differet etwork objects. These roles are P (for projects), P 1, P 2, ad P 3 (for subroles of P), S 1 (for Supervisig ), S 2 (for Aalyst ), ad T 1 (for Testig ). The roles P, P 2, P 3, ad S 2 are a private subhierarchy withi the existig hierarchy because S 1 is ot allowed to iherit soe of their perissios. Each affected role is specialized i order to odel the required private perissios. Therefore, as the figure shows, we created ew private roles (for exaple, P, P 2, P 3, ad S 2). I additio to the private roles, the syste replicated the is a relatioships betwee the origial roles, thus creatig a etire subhierarchy ivolvig all the private roles. The perissios of the private hierarchy caot be iherited by the other etwork objects, such as S 1. P Project Figure 4. A exaple of a role hierarchy ad its extesio with private roles. LOCAL ROLE HIERARCHY Local roles specify the perissios that a etwork object has to access idividual itraet resources. Global roles, which we discuss later, specify the perissios to access resources throughout the itraet. The Model A itraet s 6 architecture varies depedig o orgaizatioal requireets, resultig i varyig security requireets. A geeric role-based access cotrol odel lets a eterprise specify differet security requireets to reflect differet user authorizatios. Local-role hierarchies are the idividual role hierarchies o a itraet s copoet servers. Local-role odels are defied uch as was show i Figure 1. Each local role has a set of privileges for local etwork objects. The itraet adiistrator uses a local-role hierarchy to costruct a access privilege hierarchy. Such a hierarchy helps a adiistrator track authorized activities of etwork objects withi the itraet. Figure 5 shows the local-role hierarchies for a corporate eterprise itraet. Local-Role Database The local-role database (LRdb) stores the access iforatio of a server s etwork objects withi a itraet. A LRdb cotais differet ubers of perissio doai tables to express all accessible etwork objects that a role ca access. A perissio doai table represets which roles ca access etwork objects i a specific privilege doai. Sice SEPTEMBER OCTOBER IEEE INTERNET COMPUTING 28

6 A C C E S S C O N T R O L Applicatio server (GS 1 ) LRH 1 SQL server (GS 2 ) LRH 2 Table 3. A write perissio doai table. Network Mail-object File-object Role Object (fro Mail server) (fro File server) Project 1 1 Adiistrator 1 1 Marketig 1 0 Web server (GS 4 ) Terial LRH 4 LRH 5 LRH 3 Legacy Iteret docuetatio server (GS 5 ) Database server (GS 3 ) Figure 5. Local-role hierarchies withi a corporate eterprise itraet. a perissio set cotais six types of privilege, a LRdb the has six perissio doai tables, oe for each type of perissio (such as Supervisor, Create, Delete, Read, Write, ad Execute). Buildig a perissio doai table. To build a perissio doai table, the syste uses iforatio i the role table. This iforatio deteries the etwork objects that ca be accessed by other etwork objects, alog with the types of perissios delegated to it. Whe a itraet adiistrator assigs a user, X, to a role, r, the object iherits specific perissio to access soe etwork objects (Ys) specified i r. Withi the perissio doai table for LRdb, we record 1 for etry Ys of X. If the object Y is ot cocered with r, the the etry for Y will be 0. Table 3 shows a write perissio doai table (WDtbl). The first row refers to the roles, while the colus refer to etwork objects. I this case, a user assiged to a Marketig role has a Write privilege to the cotet of Mail-object oly i the local Mail Server. Thus, we record a 1 i the colu of the etwork object Mail-object ad a 0 for the etwork object File-object. Recoputatio of privileges. Whe a privilege is take away fro oe role ad assiged to aother, the syste ust recopute privileges to update the local-role database. Recoputatio perfors the differece of perissios withi a local-role hierarchy to deterie the correspodig Access Cotrol List for the role. For exaple, to update a doai table for the Write perissio, the syste first iserts objects ito the perissio doai table resultig fro the differece for a Write perissio. The the syste iserts etwork objects accessible fro the role table. Other doai tables for other perissios are created siilarly. Updatig the LRdb. The local-role database ust be costatly adjusted whe perissios chage for a itraet role or object. The syste updates all the tables affected by the chage i perissio. This avoids havig to update all the required tables of a LRdb. If a role or a etwork object is reoved fro the eterprise itraet, the the syste ust also delete it fro the affected doai tables. GLOBAL-ROLE HIERARCHY Global privileges i a itraet are specified ad aaged by eas of global roles ad a global-role hierarchy. The Model All itraet servers aitai a local-role database o each copoet server to check perissios before a give etwork object perfors a operatio. However, the etwork object ca attept other operatios o other servers. The etwork object thus behaves globally, havig both local ad global perissios allowig the use of differet resources. Such a etwork object is called a global etwork object. Fro a desig stadpoit, the ai differece betwee global ad local object etworks is that a global etwork object has a uique idetity kow throughout the itraet. A local etwork object has a idetity kow oly with the correspodig local server. To authorize secure access to itraet resources, we itroduce global roles. Global roles let a itraet adiistrator specify authorizatios for etwork objects across ultiple servers. These roles take idividual local roles ito accout; thus, a global role ca have ultiple local roles i ultiple servers. Together, the set of all relevat local roles defies the global perissios of the global etwork object. A exaple illustratig the defiitio of global roles i ters of local roles is give i Table 4 o the followig page. IEEE INTERNET COMPUTING SEPTEMBER OCTOBER

7 I N T R A N E T S Global role cotais ID Table 4. A exaple of a global-role table. Global Roles Global Perissios ACL R 1 r 11, r 12 GS 1 R 2 r 11, r 13 GS 1 R 3 r 11, r 15 GS 1 R 1 r 31 GS 3 Perissio has Network object type ae IPaddress cotais belogs Local role withi Server Figure 6. Key eleets of a global role ad its relatioships with local roles. r 11 :[-,-,-,R,W,X] {o 11,o 12 } r 12 :[-,C,D,R,W,X] {o 11 }[*]{o 12 } R 13 :[-,-,-,R,-,-] {o 11 } r 31 r 31 :[-,-,-,R,-,-] {*} r 33 :[-,C,D,R,W,X] {o 32 } r 35 :[-,C,D,R,W,X] {o 31 } LRH 1 r 11 r 12 r 13 LRH 3 r 35 r 33 Applicatio server (GS 1 ) SQL server (GS 3 ) Figure 7. A exaple of global role appigs. 1 Replicated GRH R 1 R 3 Replicated GRH R 3 Figure 6 illustrates a global role ad its relatioships with local roles. A global role cotais a list of local roles for each itraet server. Each local role has a Access Cotrol List cotaiig a perissio set for accessible local etwork objects. A server ca cotai ore tha oe of these objects. Like local roles, global roles also have is a relatioships that defie a global-role hierarchy depictig perissio iheritace. Perissio assiget to global roles is, as we oted earlier, through a set of perissios to servers. A global role thereby specifies local roles for each itraet server. This idetifies the access privileges of etwork objects to differet servers. The global-role hierarchy specifies a overall logical authority hierarchy for a itraet. This hierarchy lets the syste lear about a role i ters of its authorized etwork object access. The hierarchy provides a higher level of abstractio for security aageet ad, together with roles, siplifies the task of authorizatio assiget. Global-Role Database As with local-role hierarchies, a global-role database (GRdb) records all the accessible etwork objects fro ay itraet server. Withi a GRdb, a global-role table (GRtbl) stores all the authorizatios for the correspodig global roles. Forally, a GRtbl is siilar to that of a local-role table. It is a triple (r g,p g,l g ), where r g specifies global roles; p g specifies the global perissios ad l g is for the ACL. To avoid the iefficiecy that would result fro cetralizig the GRdb s iforatio access or update, the syste replicates the GRdb i each server to icrease availability of global security iforatio. A proble ay arise whe oe copy of the replica is updated withi a local server, as we will see. R 2 R 1 :[r 11,r 12 ]{GS 1 }[r 31 ]{GS3} R 2 :[r 11,r 13 ]{GS 1 }[r 33 ]{GS3} R 3 :[r 11,r 15 ]{GS 1 } R 1 R 2 R 1 :[r 11,r 12 ]{GS 1 }[r 31 ]{GS 3 } R 2 :[r 11,r 13 ]{GS 1 }[r 33 ]{GS 3 } R 3 :[r 11,r 15 ]{GS 1 } Buildig the global-role database. The global-role database, defied fro the global-role table, is built by the itraet adiistrator usig the local-role databases. This database specifies all possible authorizatios o etwork objects for global roles through specifyig the set of local roles. The itraet security adiistrator selects the locatio where the global-role database will be (physically) located i oe of the itraet servers. Figure 7 shows a exaple of global roles i a itraet. The global role R 1 has a set of perissios defied i ters of local perissios o differet servers. A global etwork object assiged a role R 1 will have a access privilege r 11 ad r 12 to server GS 1. It has Write, Read, ad Execute perissios o etwork objects o 11 ad o 12 of server GS 1. SEPTEMBER OCTOBER IEEE INTERNET COMPUTING 30

8 A C C E S S C O N T R O L a access privilege r 31 i server GS 3, eaig that it has oly Read perissio o all objects of SQL server GS 3. As the figure idicates, this eas that it has oly Read perissio o all objects of GS 3. Table 4 shows the database GRdb for the global roles R 1, R 2, ad R 3. Updatig the global-role database. The global-role database is autoatically updated by the syste whe roles are added to or deleted fro the eterprise itraet. After updatig the global-role database, the server (where the database is physically located) also broadcasts the update to other servers. This keeps replicas cosistet withi every server. Database replica cosistecy is crucial for itraet security: To eforce the required perissios o available resources, each server ust be aware of all ew roles ad subroles. Replicatig the global-role database has two key advatages. Oe is reduced itraet traffic plus provisio of a quick authorizatio validatio, usig both the local ad the replicated role hierarchy databases. The secod advatage is the availability of the global-role database. If ay oe server fails, the other servers ca still access the global database. Because of possible couicatio delays i the etwork, however, ot all replica updates ay be curret. Cosequetly, soe replicas ay ot reflect the itraet s latest security requireets. To avoid such probles, our proposed approach itroduces a executio orderig of updates to the replicas called total orderig. Our approach exteds the techique proposed by Colouris ad colleagues. 3 A descriptio of our total orderig approach follows. Give servers S 1,..., S of a itraet, each server aitais a copy of the global-role database. We deote the copies by cp 1,..., cp. To keep the copies up-to-date, the updates ust be received ad applied i the sae order i every copy. Therefore, the updates ust be uiquely idetified to eable each server to eforce the order. We propose a distributed approach, with each itraet server geeratig tie-stap idetifiers for update operatios. Each server will have a froted (FE) service resposible for geeratig update idetifiers. Each server has two defied values: F ax (which is the last axiu idetifier agreed by all the servers) ad P ax (the proposed idetifier by the frot ed). Whe a frot ed receives a update, say FE i, this does three thigs: Icreets the value of P ax by oe to ifor other servers that a ew update ust be applied to the replica. Broadcasts the value of P ax to all the reaiig servers of the itraet. Whe a server, say S j, receives the broadcasted essage, it will copute a (local) axiu idetifier based o the axiu-agreed idetifier. The forula to copute such a idetifier is ax(f ax,p i ax) / The icreet by 1 i this forula eables the frot ed (or the server) to ifor other itraet servers about the ew update. The value 1/ akes the geerated idetifier uique across the itraet. Whe the idetifiers are coputed by each of the servers, these will sed it back to the frot-ed FE i. Coputes the axiu of all idetifiers proposed by servers aitaiig the replica. Whe this has bee coputed, FE i will broadcast it to each itraet server. This will ifor all the servers of the update operatio s idetifier, ad it will update the axiu-agreed idetifier (that is, F ax ) i every server. With this proposed replicatio algorith, replicas of the global-role database will be autoatically ad cosistetly updated across the itraet. Global- ad local-role database appig. Whe a etwork object with a give role wats to access itraet resources, the object s idetity ust first be validated. The syste checks its role idetity by eas of the global-role database. If the object s global role exists, the the syste will derive its global perissios, defied as appigs of global authorizatios to local authorizatios. Later, the syste will use the six perissio doai tables i the localrole databases (of the differet servers) to verify the global role s derived local authorizatios. I-RBAC IMPLEMENTATION We have ipleeted the proposed role-based access cotrol for itraets with s. 8 These are active etwork objects that ipleet the differet security procedures by checkig the user s authorizatios (global ad local) for ay access, update, or use of the itraet s resources. I a siple way, our s refer to a active etity that ca perfor specific tasks withi a itraet eviroet. The s cotai two ai parts, a iterface ad a ipleetatio. The iterface, which is defied usig the CORBA (Coo Object Request Broker Architecture) IDL (Iterface Defiitio Laguage), 9 specifies the required security procedures to be eforced withi a itraet. These procedures ivolve, for exaple, user autheticatio, global perissio checkig, local perissio checkig, ad so o. The ipleetatio part of the describes how the security procedures ca be perfored withi a itraet s server to support the specified s iterface. Rather tha usig a sigle to eforce all the required security procedures, we have desiged the curret ipleetatio of I-RBAC to use differet s for differet resposibilities i aitaiig a itraet i a secure state. We distiguish betwee three types of s: coordiatio s, task s, ad database s. Figure 8 shows IEEE INTERNET COMPUTING SEPTEMBER OCTOBER

9 I N T R A N E T S Applicatio server (GS 1 ) Database Local replica aager Coordiatio Task Database Local role aager Local-role database Replica of GR database Network Local role aager Local replica aager Global role aager User User SQL server (GS 2 ) Database Local-role Replica database of GR database Global replica aager Database Autheticator Global-role database Security server Figure 8. The differet s required to ipleet I-RBAC. these s, ad Figure 9 illustrates their itercouicatio. Here we briefly describe soe fuctioalities. Coordiatio Agets These aage a itraet s differet activities, icludig security policy eforceet ad user autheticatio, for exaple. As show i Figure 8, the Global Role Maager (GRM) ad Global Replicatio Maager (GrM) are the coordiatio s that secure the overall ruig of a itraet. The GRM coordiates the security activity, whereas the GrM is cocered with iforatio availability withi the differet role databases whe a etwork proble occurs. Whe users first coect to a itraet, they are autheticated by the Global Autheticator. The the GRM checks the user s perissios ad couicates with the active Local Role Maager (LRM) s to see if there is ay violatio of security policies. The fial decisio of gratig the user either access or update to the itraet resources depeds o the iforatio about the user s roles recorded withi the local-role ad global-role databases. Because the itraet is a evolvig eviroet, the local-role or global-role database is updated wheever, for exaple, the user s perissios are chaged i a orgaizatio. To keep the role databases ad their replicas cosistet with itraet chages, the LRM or GRM s sed ay operatio o the role database to the GrM. The GrM s ai fuctio is to eforce the total orderig of operatios o the replicas, usig the algorith we preseted earlier. Whe the operatio s idetifiers are geerated, GrM the broadcasts the geerated total order to be applied o every replica by the Local Replica Maager (LrM) s. Task Agets These are resposible for specific activities withi a itraet, for exaple, the optiizatio of the user s queries ad the checkig of the user s authorizatio. Figures 8 ad 9 show two task s, the LRM ad the LrM. The LRM cotais the security procedures that check the local user s perissios ad couicate to the GRM whether or ot the user ca be grated the right to perfor a operatio. The LrM s ai fuctio of course is to keep the differet replicas of the role databases cosistet. Whe a LrM receives the total order fro the GrM, it trasits the operatios, oe by oe, to the Database. SEPTEMBER OCTOBER IEEE INTERNET COMPUTING 32

10 A C C E S S C O N T R O L User Global replica aager 1. Operatio o itraet 3. Get global roles 3. Ask to eforce total orderig 2. Autheticate the user Global role aager Global perissios Database 4. Trasit perissio set 5. Get local roles Local role aager Local perissios 6. Check the local perissios agaist the operatio type 7. Perfor the operatio 1. Update operatio o a role database Server 4. Sed the order of operatio executio Local replica aager 2. Delegate 5. Perfor a update operatio Coordiatio Task Database Messages related to security aageet Messages related to replicatio aageet Flow of data Figure 9. Couicatio betwee s. Database Agets These perfor typical database fuctios icludig, for exaple, updatig the local-role ad global-role databases. A Database, prior to perforig a operatio o the appropriate database, first asks the Autheticator to autheticate the requestig the database update. If the autheticatio succeeds, the the Database perfors the operatio ad duly ifors the requester. CONCLUSION AND FUTURE WORK The proposed I-RBAC access cotrol eables efficiet security aageet withi itraets. Our experiece shows that a corporate eterprise itraet s security depeds largely o access cotrol aageet. Oe advatage of the proposed I-RBAC is flexibility i tailorig security requireets to eet differet security access policies of a corporate eterprise itraet. This is achieved by icludig withi I-RBAC a efficiet user authorizatio echais based o user-to-role assiget, ad also by providig a echais to structure authority resposibility for differet servers. The ipleetatio we ve discussed ca be used by ay corporate eterprise to protect their itraet s server-based resources fro itruders. The security s will filter aoyous access ad thereby stop ay illegal or isecure use of etwork resources. Fro the stadpoit of corporate eterprises, I-RBAC ay have a couple of liitatios: Oe ajor proble cocers cosistecy betwee roles. This ca be expressed i ters of local-role ad globalrole databases. Because a itraet is a evolvig eviroet, the evolutio of roles ust be aaged to keep the differet databases cosistet to reflect ew security requireets. Solutios to this proble will be based o static ad dyaic separatio of duties. 6 Static separatio refers to the fact that a user caot be assiged to two related roles siultaeously, whereas dyaic separatio lets a user be assiged to ultiple related roles. The user caot, however, activate all these roles at the sae tie. The issue of operatio cocurrecy has ot bee addressed withi I-RBAC. I a itraet eviroet, there are ofte ultiple cocurret operatios executed by differet users. The proble occurs particularly whe the cocurret operatios update the sae iforatio withi a itraet. Solutios ca be borrowed fro work doe i distributed databases, such as lockig ad tie-stap protocols, to eforce cosistecy. Future work will cocer I-RBAC s extesio to deal with the two probles just described. Also, our proposed IEEE INTERNET COMPUTING SEPTEMBER OCTOBER

11 I N T R A N E T S ipleetatio will be exteded to iclude itraet federatios, thus eablig security policy eforceet withi large-scale distributed systes. Architecture ad Specificatios, rev. 2.2, Fraigha, Mass., 1995, (OMG docuetatio available at REFERENCES 1. S.L. Tellee, ItraNet Methodology: Cocepts ad Ratioale, tech. report, Adahl Corp., 1997; itra/cocepts1.htl. 2. R.W. Baldwi, Naig ad Groupig Privileges to Siplify Security Maageet i Large Databases, Proc. IEEE CS Syp. o Research i Security ad Privacy, Los Alaitos, Calif., 1990, pp G. Colouris, J. Dolliore, ad T. Kidberg, Distributed Systes: Cocepts ad Desig, 2d ed., Addiso-Wesley, Readig, Mass., R. Elasri, J. Weeldreyer, ad A. Hever, The Category Cocept: A Extesio of the Etity Relatioship Model, It l J. Data ad Kowledge Egieerig, Vol. 1, No. 1, May R.S. Sadhu ad P. Saarati, Access Cotrol: Priciple ad Practice, IEEE Co., Sept. 1994, pp R.S. Sadhu ad E.J. Coye, Role-Based Access Cotrol Models, Coputer, Feb. 1996, pp R.S. Sadhu ad H.L. Feistei, A Three-Tier Architecture for Role- Based Access Cotrol, Proc. 17th NIST-NCS Nat l Coputer Security Cof., Baltiore, Md., 1994, pp Z. Tari, Usig Agets for Secure Access to Data i the Iteret, IEEE Co., Jue 1997, pp Object Maageet Group, Coo Object Request Broker Zahir Tari is a seior lecturer at Royal Melboure Istitute of Techology i Australia. He is leadig the DOK (Distributed Object Kerel) project aied at the desig of a set of federated services o a CORBA platfor ( Tari eared a aster i operatioal research ad a PhD i coputer sciece, both fro the Uiversity of Greoble, Frace. He is the progra coittee co-chair of the IFIP Database Seatics 1998 iteratioal coferece. He is a eber of the IEEE, ACM, ad AIS (Associatio of Iforatio Systes). Shu-Wu Cha is a aster studet i iforatio techology at Royal Melboure Istitute of Techology (RMIT) i Australia. His aster research project relates to the desig ad ipleetatio of the I-RBAC for itraet security. Cha s research iterests are objectorieted databases ad advaced cliet-server architectures. Cha obtaied a bachelor degree i coputer sciece ad a aster degree i iforatio techology, both fro RMIT. Cotact the authors at Dept. of Coputer Sciece, RMIT, Budoora East Capus, VIC 3083 Australia; zahirt@cs.rit.edu.au; shuc@ubat. cs.rit.edu.au; edu.au/~shuc. Itercoectio Networks A Egieerig Approach by José Duato, Sudhakar Yalaachili, ad Lioel Ni Addresses the challeges ad basic uderlyig cocepts of itercoectio etworks. Itercoectio Network s egieerig approach cosiders the issues that desigers face ad presets a broad set of practical solutios. The authors establish ore accurate classificatios for a uber of differet issues: topologies, switchig techiques, routig algoriths ad probles that prevet essage delivery. The authors itroduce ew views that ake cocepts easier to uder-stad, like the uified view of direct ad idirect etworks, the uified theory of deadlock avoidace ad recovery. The book is orgaized to serve as a referece as well as a resource for learig. Supportig aterials icludig a etwork siulator will be available o the book s web site: cosiderably siplifyig the task of teachig courses o itercoectio etworks ad orgaizig lab classes. The web site will also serve as a foru for discussio ad exchage of ideas for itercoectio etworks. Cotets: Itroductio Message Switchig Layer Deadlock, Livelock, ad Starvatio Routig Algoriths Collective Couicatio Support Fault Tolerat Routig Network Architectures Message Layer Software Perforace Evaluatio Appedix Bibliography 536 pages. 8" x 10" Hardcover. Septeber ISBN Catalog # BP07800 $50.00 Mebers / $60.00 List Go to the Olie Bookstore ad order usig the olie shoppig cart ad the secure order for IEEE Coputer Society Los Vaqueros Circle Los Alaitos, CA Toll-Free CS.BOOKS Phoe:

Configuring Additional Active Directory Server Roles

Configuring Additional Active Directory Server Roles Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio

More information

CHAPTER 4: NET PRESENT VALUE

CHAPTER 4: NET PRESENT VALUE EMBA 807 Corporate Fiace Dr. Rodey Boehe CHAPTER 4: NET PRESENT VALUE (Assiged probles are, 2, 7, 8,, 6, 23, 25, 28, 29, 3, 33, 36, 4, 42, 46, 50, ad 52) The title of this chapter ay be Net Preset Value,

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out FME Server Security Table of Cotets FME Server Autheticatio - Access Cotrol Default Security Active Directory Trusted Autheticatio Guest User or Aoymous (u-autheticated) Loggig Out Authorizatio - Roles

More information

Domain 1: Configuring Domain Name System (DNS) for Active Directory

Domain 1: Configuring Domain Name System (DNS) for Active Directory Maual Widows Domai 1: Cofigurig Domai Name System (DNS) for Active Directory Cofigure zoes I Domai Name System (DNS), a DNS amespace ca be divided ito zoes. The zoes store ame iformatio about oe or more

More information

Engineering Data Management

Engineering Data Management BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package

More information

Ant Colony Algorithm Based Scheduling for Handling Software Project Delay

Ant Colony Algorithm Based Scheduling for Handling Software Project Delay At Coloy Algorith Based Schedulig for Hadlig Software Project Delay Wei Zhag 1,2, Yu Yag 3, Juchao Xiao 4, Xiao Liu 5, Muhaad Ali Babar 6 1 School of Coputer Sciece ad Techology, Ahui Uiversity, Hefei,

More information

An Electronic Tool for Measuring Learning and Teaching Performance of an Engineering Class

An Electronic Tool for Measuring Learning and Teaching Performance of an Engineering Class A Electroic Tool for Measurig Learig ad Teachig Perforace of a Egieerig Class T.H. Nguye, Ph.D., P.E. Abstract Creatig a egieerig course to eet the predefied learig objectives requires a appropriate ad

More information

Baan Service Master Data Management

Baan Service Master Data Management Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :

More information

Domain 1 - Describe Cisco VoIP Implementations

Domain 1 - Describe Cisco VoIP Implementations Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.

More information

ECONOMICS. Calculating loan interest no. 3.758

ECONOMICS. Calculating loan interest no. 3.758 F A M & A N H S E E S EONOMS alculatig loa iterest o. 3.758 y Nora L. Dalsted ad Paul H. Gutierrez Quick Facts... The aual percetage rate provides a coo basis to copare iterest charges associated with

More information

ODBC. Getting Started With Sage Timberline Office ODBC

ODBC. Getting Started With Sage Timberline Office ODBC ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.

More information

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

Domain 1 Components of the Cisco Unified Communications Architecture

Domain 1 Components of the Cisco Unified Communications Architecture Maual CCNA Domai 1 Compoets of the Cisco Uified Commuicatios Architecture Uified Commuicatios (UC) Eviromet Cisco has itroduced what they call the Uified Commuicatios Eviromet which is used to separate

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

A virtual life cycle structured platform for building applications

A virtual life cycle structured platform for building applications A virtual life cycle structured platfor for buildig applicatios Petra Both, Niklaus Kohler, Robi Gessa Istitute for Idustrial Buildig Productio, Uiversity of Karlsruhe (TH), Geay (petra@voboth.de) Suary

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

ContactPro Desktop for Multi-Media Contact Center

ContactPro Desktop for Multi-Media Contact Center CotactPro Desktop for Multi-Media Cotact Ceter CCT CotactPro (CP) is the perfect solutio for the aget desktop i a Avaya multimedia call ceter eviromet. CotactPro empowers agets to efficietly serve customers

More information

IT Support. 020 8269 6878 n www.premierchoiceinternet.com n support@premierchoiceinternet.com. 30 Day FREE Trial. IT Support from 8p/user

IT Support. 020 8269 6878 n www.premierchoiceinternet.com n support@premierchoiceinternet.com. 30 Day FREE Trial. IT Support from 8p/user IT Support IT Support Premier Choice Iteret has bee providig reliable, proactive & affordable IT Support solutios to compaies based i Lodo ad the South East of Eglad sice 2002. Our goal is to provide our

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

A Secure Implementation of Java Inner Classes

A Secure Implementation of Java Inner Classes A Secure Implemetatio of Java Ier Classes By Aasua Bhowmik ad William Pugh Departmet of Computer Sciece Uiversity of Marylad More ifo at: http://www.cs.umd.edu/~pugh/java Motivatio ad Overview Preset implemetatio

More information

Desktop Management. Desktop Management Tools

Desktop Management. Desktop Management Tools Desktop Maagemet 9 Desktop Maagemet Tools Mac OS X icludes three desktop maagemet tools that you might fid helpful to work more efficietly ad productively: u Stacks puts expadable folders i the Dock. Clickig

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

The Binomial Multi- Section Transformer

The Binomial Multi- Section Transformer 4/15/21 The Bioial Multisectio Matchig Trasforer.doc 1/17 The Bioial Multi- Sectio Trasforer Recall that a ulti-sectio atchig etwork ca be described usig the theory of sall reflectios as: where: Γ ( ω

More information

Article Writing & Marketing: The Best of Both Worlds!

Article Writing & Marketing: The Best of Both Worlds! 2612 JOURNAL OF SOFTWARE, VOL 8, NO 1, OCTOBER 213 C-Cell: A Efficiet ad Scalable Network Structure for Data Ceters Hui Cai Logistical Egieerig Uiversity of PLA, Chogqig, Chia Eail: caihui_cool@126co ShegLi

More information

BaanERP. BaanERP Windows Client Installation Guide

BaanERP. BaanERP Windows Client Installation Guide BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject to

More information

Tradigms of Astundithi and Toyota

Tradigms of Astundithi and Toyota Tradig the radomess - Desigig a optimal tradig strategy uder a drifted radom walk price model Yuao Wu Math 20 Project Paper Professor Zachary Hamaker Abstract: I this paper the author iteds to explore

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

A Cyclical Nurse Schedule Using Goal Programming

A Cyclical Nurse Schedule Using Goal Programming ITB J. Sci., Vol. 43 A, No. 3, 2011, 151-164 151 A Cyclical Nurse Schedule Usig Goal Prograig Ruzzaiah Jeal 1,*, Wa Rosaira Isail 2, Liog Choog Yeu 3 & Ahed Oughalie 4 1 School of Iforatio Techology, Faculty

More information

client communication

client communication CCH Portal cliet commuicatio facig today s challeges Like most accoutacy practices, we ow use email for most cliet commuicatio. It s quick ad easy, but we do worry about the security of sesitive data.

More information

Professional Networking

Professional Networking Professioal Networkig 1. Lear from people who ve bee where you are. Oe of your best resources for etworkig is alumi from your school. They ve take the classes you have take, they have bee o the job market

More information

One Goal. 18-Months. Unlimited Opportunities.

One Goal. 18-Months. Unlimited Opportunities. 18 fast-track 18-Moth BACHELOR S DEGREE completio PROGRAMS Oe Goal. 18-Moths. Ulimited Opportuities. www.ortheaster.edu/cps Fast-Track Your Bachelor s Degree ad Career Goals Complete your bachelor s degree

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY Optimize your Network I the Courier, Express ad Parcel market ADDING CREDIBILITY Meetig today s challeges ad tomorrow s demads Aswers to your key etwork challeges ORTEC kows the highly competitive Courier,

More information

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2 Itroductio DAME - Microsoft Excel add-i for solvig multicriteria decisio problems with scearios Radomir Perzia, Jaroslav Ramik 2 Abstract. The mai goal of every ecoomic aget is to make a good decisio,

More information

Ideate, Inc. Training Solutions to Give you the Leading Edge

Ideate, Inc. Training Solutions to Give you the Leading Edge Ideate, Ic. Traiig News 2014v1 Ideate, Ic. Traiig Solutios to Give you the Leadig Edge New Packages For All Your Traiig Needs! Bill Johso Seior MEP - Applicatio Specialist Revit MEP Fudametals Ad More!

More information

Information for Programs Seeking Initial Accreditation

Information for Programs Seeking Initial Accreditation Iformatio for Programs Seekig Iitial Accreditatio Aswers to Frequetly- Asked-Questios (from www.abet.org/ew-to-accreditatio/) Assurig Quality l Stimulatig Iovatio This documet iteds to aswer may of the

More information

Shared Memory with Caching

Shared Memory with Caching Vorlesug Recherarchitektur 2 Seite 164 Cachig i MIMD-Architectures ] MIMD-Architekture Programmiermodell Behadlug der Kommuikatioslatez Nachrichteorietiert globaler Adressraum Latez miimiere Latez verstecke

More information

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth Questio 1: What is a ordiary auity? Let s look at a ordiary auity that is certai ad simple. By this, we mea a auity over a fixed term whose paymet period matches the iterest coversio period. Additioally,

More information

INTEGRATED TRANSFORMER FLEET MANAGEMENT (ITFM) SYSTEM

INTEGRATED TRANSFORMER FLEET MANAGEMENT (ITFM) SYSTEM INTEGRATED TRANSFORMER FLEET MANAGEMENT (ITFM SYSTEM Audrius ILGEVICIUS Maschiefabrik Reihause GbH, a.ilgevicius@reihause.co Alexei BABIZKI Maschiefabrik Reihause GbH a.babizki@reihause.co ABSTRACT The

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13 EECS 70 Discrete Mathematics ad Probability Theory Sprig 2014 Aat Sahai Note 13 Itroductio At this poit, we have see eough examples that it is worth just takig stock of our model of probability ad may

More information

Flood Emergency Response Plan

Flood Emergency Response Plan Flood Emergecy Respose Pla This reprit is made available for iformatioal purposes oly i support of the isurace relatioship betwee FM Global ad its cliets. This iformatio does ot chage or supplemet policy

More information

GOAL PROGRAMMING BASED MASTER PLAN FOR CYCLICAL NURSE SCHEDULING

GOAL PROGRAMMING BASED MASTER PLAN FOR CYCLICAL NURSE SCHEDULING Joural of Theoretical ad Applied Iforatio Techology 5 th Deceber 202. Vol. 46 No. 2005-202 JATIT & LLS. All rights reserved. ISSN: 992-8645 www.jatit.org E-ISSN: 87-395 GOAL PROGRAMMING BASED MASTER PLAN

More information

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Domai 1: Idetifyig Cause of ad Resolvig Desktop Applicatio Issues Idetifyig ad Resolvig New Software Istallatio Issues This sectio

More information

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical

More information

the product of the hook-lengths is over all boxes of the diagram. We denote by d (n) the number of semi-standard tableaux:

the product of the hook-lengths is over all boxes of the diagram. We denote by d (n) the number of semi-standard tableaux: O Represetatio Theory i Coputer Visio Probles Ao Shashua School of Coputer Sciece ad Egieerig Hebrew Uiversity of Jerusale Jerusale 91904, Israel eail: shashua@cs.huji.ac.il Roy Meshula Departet of Matheatics

More information

GSR: A Global Stripe-based Redistribution Approach to Accelerate RAID-5 Scaling

GSR: A Global Stripe-based Redistribution Approach to Accelerate RAID-5 Scaling : A Global -based Redistributio Approach to Accelerate RAID-5 Scalig Chetao Wu ad Xubi He Departet of Electrical & Coputer Egieerig Virgiia Coowealth Uiversity {wuc4,xhe2}@vcu.edu Abstract Uder the severe

More information

A Network Monitoring System with a Peer-to- Peer Architecture

A Network Monitoring System with a Peer-to- Peer Architecture A Network Moitorig System with a Peer-to- Peer Architecture Paulo Salvador ad Rui Valadas Uiversity of Aveiro Istitute of Telecommuicatios Summary Motivatio Peer-to-peer architecture System elemets Data

More information

hp calculators HP 12C Statistics - average and standard deviation Average and standard deviation concepts HP12C average and standard deviation

hp calculators HP 12C Statistics - average and standard deviation Average and standard deviation concepts HP12C average and standard deviation HP 1C Statistics - average ad stadard deviatio Average ad stadard deviatio cocepts HP1C average ad stadard deviatio Practice calculatig averages ad stadard deviatios with oe or two variables HP 1C Statistics

More information

Ken blanchard college of business

Ken blanchard college of business Ke blachard College of BUSINESS a history of excellece Established i 1949, Grad Cayo Uiversity has more tha a 60-year track record of helpig studets achieve their academic goals. The Ke Blachard College

More information

Chapter 10 Computer Design Basics

Chapter 10 Computer Design Basics Logic ad Computer Desig Fudametals Chapter 10 Computer Desig Basics Part 1 Datapaths Charles Kime & Thomas Kamiski 2004 Pearso Educatio, Ic. Terms of Use (Hyperliks are active i View Show mode) Overview

More information

Supply Chain Network Design with Preferential Tariff under Economic Partnership Agreement

Supply Chain Network Design with Preferential Tariff under Economic Partnership Agreement roceedigs of the 2014 Iteratioal oferece o Idustrial Egieerig ad Oeratios Maageet Bali, Idoesia, Jauary 7 9, 2014 Suly hai Network Desig with referetial ariff uder Ecooic artershi greeet eichi Fuaki Yokohaa

More information

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which

More information

A Flexible Web-Based Publication Database

A Flexible Web-Based Publication Database A Flexible Web-Based Publicatio Database Karl Riedlig ad Siegfried Selberherr 2 Istitute of Sesor ad Actuator Systems 2 Istitute for Microelectroics Techische Uiversität Wie Gusshausstrasse 27-29 A-040

More information

Digital Interactive Kanban Advertisement System Using Face Recognition Methodology

Digital Interactive Kanban Advertisement System Using Face Recognition Methodology Coputatioal Water, Eergy, ad Eviroetal Egieerig, 2013, 2, 26-30 doi:10.4236/cweee.2013.23b005 Published Olie July 2013 (http://www.scirp.org/joural/cweee) Digital Iteractive Kaba Advertiseet Syste Usig

More information

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring No-life isurace mathematics Nils F. Haavardsso, Uiversity of Oslo ad DNB Skadeforsikrig Mai issues so far Why does isurace work? How is risk premium defied ad why is it importat? How ca claim frequecy

More information

E-Plex Enterprise Access Control System

E-Plex Enterprise Access Control System Eterprise Access Cotrol System Egieered for Flexibility Modular Solutio The Eterprise Access Cotrol System is a modular solutio for maagig access poits. Employig a variety of hardware optios, system maagemet

More information

STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA. Maya Maria, Universitas Terbuka, Indonesia

STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA. Maya Maria, Universitas Terbuka, Indonesia STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA Maya Maria, Uiversitas Terbuka, Idoesia Co-author: Amiuddi Zuhairi, Uiversitas Terbuka, Idoesia Kuria Edah

More information

A Meta-Plugin for Bespoke Data Management in WordPress

A Meta-Plugin for Bespoke Data Management in WordPress A Meta-Plugi for Bespoke Data Maagemet i WordPress Stefaia Leoe, Alexadre de Spidler, ad Moira C. Norrie Istitute for Iformatio Systems, ETH Zurich CH-8092 Zurich, Switzerlad {leoe despidler orrie}@if.ethz.ch

More information

CDAS: A Crowdsourcing Data Analytics System

CDAS: A Crowdsourcing Data Analytics System CDAS: A Crowdsourcig Data Aalytics Syste Xua Liu,MeiyuLu, Beg Chi Ooi, Yaya She,SaiWu, Meihui Zhag School of Coputig, Natioal Uiversity of Sigapore, Sigapore College of Coputer Sciece, Zhejiag Uiversity,

More information

CCH CRM Books Online Software Fee Protection Consultancy Advice Lines CPD Books Online Software Fee Protection Consultancy Advice Lines CPD

CCH CRM Books Online Software Fee Protection Consultancy Advice Lines CPD Books Online Software Fee Protection Consultancy Advice Lines CPD Books Olie Software Fee Fee Protectio Cosultacy Advice Advice Lies Lies CPD CPD facig today s challeges As a accoutacy practice, maagig relatioships with our cliets has to be at the heart of everythig

More information

INVESTMENT PERFORMANCE COUNCIL (IPC)

INVESTMENT PERFORMANCE COUNCIL (IPC) INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks

More information

Properties of MLE: consistency, asymptotic normality. Fisher information.

Properties of MLE: consistency, asymptotic normality. Fisher information. Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout

More information

optimise your investment in Microsoft technology. Microsoft Consulting Services from CIBER

optimise your investment in Microsoft technology. Microsoft Consulting Services from CIBER optimise your ivestmet i Microsoft techology. Microsoft Cosultig Services from Microsoft Cosultig Services from MICROSOFT CONSULTING SERVICES ca help with ay stage i the lifecycle of adoptig Microsoft

More information

SOLAR POWER PROFILE PREDICTION FOR LOW EARTH ORBIT SATELLITES

SOLAR POWER PROFILE PREDICTION FOR LOW EARTH ORBIT SATELLITES Jural Mekaikal Jue 2009, No. 28, 1-15 SOLAR POWER PROFILE PREDICTION FOR LOW EARTH ORBIT SATELLITES Chow Ki Paw, Reugath Varatharajoo* Departet of Aerospace Egieerig Uiversiti Putra Malaysia 43400 Serdag,

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

Document Control Solutions

Document Control Solutions Documet Cotrol Solutios State of the art software The beefits of Assai Assai Software Services provides leadig edge Documet Cotrol ad Maagemet System software for oil ad gas, egieerig ad costructio. AssaiDCMS

More information

Using a Packet Sniffer to Analyze the Efficiency and Power of Encryption Techniques Used to Protect Data Over a Computer Network

Using a Packet Sniffer to Analyze the Efficiency and Power of Encryption Techniques Used to Protect Data Over a Computer Network sig a Packet Siffer to Aalyze the Efficiecy ad Power of Ecryptio Techiques sed to Protect Data Over a Coputer Network Seyo Litviov Statistics Departet/MCS Progra St. Cloud State iversity slitviov@stcloudstate.edu

More information

CHAPTER 3 DIGITAL CODING OF SIGNALS

CHAPTER 3 DIGITAL CODING OF SIGNALS CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity

More information

GOOD PRACTICE CHECKLIST FOR INTERPRETERS WORKING WITH DOMESTIC VIOLENCE SITUATIONS

GOOD PRACTICE CHECKLIST FOR INTERPRETERS WORKING WITH DOMESTIC VIOLENCE SITUATIONS GOOD PRACTICE CHECKLIST FOR INTERPRETERS WORKING WITH DOMESTIC VIOLENCE SITUATIONS I the sprig of 2008, Stadig Together agaist Domestic Violece carried out a piece of collaborative work o domestic violece

More information

How To Write A Privacy Policy For A Busiess

How To Write A Privacy Policy For A Busiess Office of the Privacy Commissioer of Caada PIPEDA Privacy Guide for Small Busiesses: The Basics Privacy is the best policy Hadlig privacy cocers correctly ca help improve your orgaizatio s reputatio. Whe

More information

Agenda. Outsourcing and Globalization in Software Development. Outsourcing. Outsourcing here to stay. Outsourcing Alternatives

Agenda. Outsourcing and Globalization in Software Development. Outsourcing. Outsourcing here to stay. Outsourcing Alternatives Outsourcig ad Globalizatio i Software Developmet Jacques Crocker UW CSE Alumi 2003 jc@cs.washigto.edu Ageda Itroductio The Outsourcig Pheomeo Leadig Offshore Projects Maagig Customers Offshore Developmet

More information

arxiv:0903.5136v2 [math.pr] 13 Oct 2009

arxiv:0903.5136v2 [math.pr] 13 Oct 2009 First passage percolatio o rado graphs with fiite ea degrees Shakar Bhaidi Reco va der Hofstad Gerard Hooghiestra October 3, 2009 arxiv:0903.536v2 [ath.pr 3 Oct 2009 Abstract We study first passage percolatio

More information

CREATIVE MARKETING PROJECT 2016

CREATIVE MARKETING PROJECT 2016 CREATIVE MARKETING PROJECT 2016 The Creative Marketig Project is a chapter project that develops i chapter members a aalytical ad creative approach to the marketig process, actively egages chapter members

More information

Unicenter TCPaccess FTP Server

Unicenter TCPaccess FTP Server Uiceter TCPaccess FTP Server Release Summary r6.1 SP2 K02213-2E This documetatio ad related computer software program (hereiafter referred to as the Documetatio ) is for the ed user s iformatioal purposes

More information

CCH Accounts Production

CCH Accounts Production CCH Accouts Productio accouts productio facig today s challeges Preparig statutory ad fiacial accouts is a core activity for our practice, as it is for may professioal firms. Although legislatio ad accoutig

More information

5 Boolean Decision Trees (February 11)

5 Boolean Decision Trees (February 11) 5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected

More information

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology

More information

Distributed Storage Allocations for Optimal Delay

Distributed Storage Allocations for Optimal Delay Distributed Storage Allocatios for Optial Delay Derek Leog Departet of Electrical Egieerig Califoria Istitute of echology Pasadea, Califoria 925, USA derekleog@caltechedu Alexadros G Diakis Departet of

More information

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC 8 th Iteratioal Coferece o DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a i a, M a y 25 27, 2 6 ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC Vadim MUKHIN 1, Elea PAVLENKO 2 Natioal Techical

More information

Design and Implementation of a Publication Database for the Vienna University of Technology

Design and Implementation of a Publication Database for the Vienna University of Technology Desig ad Implemetatio of a Publicatio Database for the Viea Uiversity of Techology Karl Riedlig Istitute of Idustrial Electroics ad Material Sciece, TU Wie, A-040 Viea karl.riedlig@tuwie.ac.at Abstract:

More information

A guide to School Employees' Well-Being

A guide to School Employees' Well-Being A guide to School Employees' Well-Beig Backgroud The public school systems i the Uited States employ more tha 6.7 millio people. This large workforce is charged with oe of the atio s critical tasks to

More information

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks Maual Security+ Domai 1 Network Security Every etwork is uique, ad architecturally defied physically by its equipmet ad coectios, ad logically through the applicatios, services, ad idustries it serves.

More information

Matrix Model of Trust Management in P2P Networks

Matrix Model of Trust Management in P2P Networks Matrix Model of Trust Maagemet i P2P Networks Miroslav Novotý, Filip Zavoral Faculty of Mathematics ad Physics Charles Uiversity Prague, Czech Republic miroslav.ovoty@mff.cui.cz Abstract The trust maagemet

More information

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA , pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of

More information

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV)

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV) Ehacig Oracle Busiess Itelligece with cubus EV How users of Oracle BI o Essbase cubes ca beefit from cubus outperform EV Aalytics (cubus EV) CONTENT 01 cubus EV as a ehacemet to Oracle BI o Essbase 02

More information

Subject CT5 Contingencies Core Technical Syllabus

Subject CT5 Contingencies Core Technical Syllabus Subject CT5 Cotigecies Core Techical Syllabus for the 2015 exams 1 Jue 2014 Aim The aim of the Cotigecies subject is to provide a groudig i the mathematical techiques which ca be used to model ad value

More information

BaanERP 5.0c. EDI User Guide

BaanERP 5.0c. EDI User Guide BaaERP 5.0c A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject

More information

Convention Paper 6764

Convention Paper 6764 Audio Egieerig Society Covetio Paper 6764 Preseted at the 10th Covetio 006 May 0 3 Paris, Frace This covetio paper has bee reproduced from the author's advace mauscript, without editig, correctios, or

More information

Baan Finance Accounts Payable

Baan Finance Accounts Payable Baa Fiace Accouts Payable Module Procedure UP035A US Documetiformatio Documet Documet code : UP035A US Documet group : User Documetatio Documet title : Accouts Payable Applicatio/Package : Baa Fiace Editio

More information

Digital Enterprise Unit. White Paper. Web Analytics Measurement for Responsive Websites

Digital Enterprise Unit. White Paper. Web Analytics Measurement for Responsive Websites Digital Eterprise Uit White Paper Web Aalytics Measuremet for Resposive Websites About the Authors Vishal Machewad Vishal Machewad has over 13 years of experiece i sales ad marketig, havig worked as a

More information

Location, Location, Location! Modeling Data Proximity in the Cloud

Location, Location, Location! Modeling Data Proximity in the Cloud Locatio, Locatio, Locatio! Modelig Data Proximity i the Cloud Birjodh Tiwaa tiwaa@eecs.umich.edu Uiversity of Michiga rbor, MI Hitesh Ballai hiballa@microsoft.com Microsoft Research Cambridge, UK Mahesh

More information

Generalized Scheme For Fractal Based Digital Signature (GFDS)

Generalized Scheme For Fractal Based Digital Signature (GFDS) IJCSS Iteratioal Joural of Computer Sciece ad etwork Security, VOL.7 o.7, July 2007 99 Geeralized Scheme For Fractal Based Digital Sigature (GFDS) Mohammad Ahmad Alia ad Azma Bi Samsudi, School of Computer

More information

How to read A Mutual Fund shareholder report

How to read A Mutual Fund shareholder report Ivestor BulletI How to read A Mutual Fud shareholder report The SEC s Office of Ivestor Educatio ad Advocacy is issuig this Ivestor Bulleti to educate idividual ivestors about mutual fud shareholder reports.

More information

leasing Solutions We make your Business our Business

leasing Solutions We make your Business our Business if you d like to discover how Bp paribas leasig Solutios Ca help you to achieve your goals please get i touch leasig Solutios We make your Busiess our Busiess We look forward to hearig from you you ca

More information

Transient Vibration of the single degree of freedom systems.

Transient Vibration of the single degree of freedom systems. Trasiet Vibratio of the sigle degree of freedo systes. 1. -INTRODUCTION. Trasiet vibratio is defied as a teporarily sustaied vibratio of a echaical syste. It ay cosist of forced or free vibratios, or both

More information

Entropy of bi-capacities

Entropy of bi-capacities Etropy of bi-capacities Iva Kojadiovic LINA CNRS FRE 2729 Site école polytechique de l uiv. de Nates Rue Christia Pauc 44306 Nates, Frace iva.kojadiovic@uiv-ates.fr Jea-Luc Marichal Applied Mathematics

More information

Message Exchange in the Utility Market Using SAP for Utilities. Point of View by Marc Metz and Maarten Vriesema

Message Exchange in the Utility Market Using SAP for Utilities. Point of View by Marc Metz and Maarten Vriesema Eergy, Utilities ad Chemicals the way we see it Message Exchage i the Utility Market Usig SAP for Utilities Poit of View by Marc Metz ad Maarte Vriesema Itroductio Liberalisatio of utility markets has

More information

Controller Area Network (CAN) Schedulability Analysis: Refuted, Revisited and Revised

Controller Area Network (CAN) Schedulability Analysis: Refuted, Revisited and Revised Cotroller Area Networ (CAN) Schedulability Aalysis: Refuted, Revisited ad Revised Robert. Davis ad Ala Burs Real-ie Systes Research Group, Departet of Coputer Sciece, Uiversity of Yor, YO1 5DD, Yor (UK)

More information