On XACML, role-based access control, and health grids
|
|
|
- Coral Wade
- 10 years ago
- Views:
Transcription
1 On XACML, role-based access control, and health grids 01 On XACML, role-based access control, and health grids D. Power, M. Slaymaker, E. Politou and A. Simpson
2 On XACML, role-based access control, and health grids 02 Contents Background XACML Role Based Access Control An Example Implementation using the RBAC Profile Possible Solutions An Alternative Implementation Conclusions and Further Work
3 On XACML, role-based access control, and health grids 03 Background Within the UK, the National Health Service (NHS) comprises a number of hospital trusts, each of which is an independent legal entity. Each hospital trust is legally responsible for the data held at its sites: this data is released only with respect to the principles of the Caldicott Guardian, which include: Don t use patient-identifiable information unless it is absolutely necessary. Use the minimum necessary patient-identifiable data. Access to patient-identifiable information should be on a strict need to know basis. Everyone should be aware of their responsibilities.
4 On XACML, role-based access control, and health grids 04 XACML XACML (extensible Access Control Markup Language) is an OASIS standard that allows one to describe in terms of XML two languages for a particular application. The first language the policy language is used to describe general access control requirements. The policy language has standard extension points that allow one to define aspects such as new functions, data types, and logics to combine such entities. The second language the request/response language allows one to construct a query to determine whether a particular action should be permitted. Every response contains an answer pertaining to whether the action should be permitted.
5 On XACML, role-based access control, and health grids 05 access requester PEP 2. access request 11. obligations obligations service 3. Request 10. Response PDP 8. target, attribute, resource 9. decision context handler 7. resource resource 4. attribute query 6. attribute 1. Policy or policy set PIP 5c. resource attributes 5b. environment attributes 5a. subject attributes PAP subjects environment XACML Architecture
6 On XACML, role-based access control, and health grids 06 Role Based Access Control Role-based access control has gained in popularity in recent years, with one of the principal reasons for this being that the approach offers the benefits of greatly simplified policies by exploiting the natural hierarchies of the workplace. Further, many vendors have started to incorporate role-based access control into their products. The approach allows privileges to be associated with arbitrary roles, and, in turn, these roles can be associated with users. This offers the benefits of providing increased granularity and reducing administrative effort.
7 On XACML, role-based access control, and health grids 07 Given the legal and ethical requirements that are incumbent upon us in the health domain we may conclude that from an access control point of view the access given to a user will depend on many factors. To be able to exploit the advantages of role-based access control without limiting all access decisions to be entirely based on a users role it is first necessary to be able to mix role-based decisions with decisions based on other factors. As a generic and extensible language, XACML is fully capable of supporting such policies. However, as we shall see, the standard RBAC profile adds some undesirable limitations, which it has been necessary for us to remove.
8 On XACML, role-based access control, and health grids 08 XACML RBAC Profile To address some of the problems associated with role-based access control in XACML there is a specific role-based access control profile. Assuming that the roles of a subject have already been determined (or can be determined at the time the policy is evaluated), the profile suggests the formation of two special types of Policy Sets to describe the permissions of various roles. These are called the Role Policy Set (RPS) and the Permission Policy Set (PPS). A Role Policy Set is only applicable to a specific role. Each role has its own Role Policy Set. The actual permissions for a role are specified in a Permission Policy Set, which is referenced by the Role Policy Set. This extra level of indirection allows one role to possess all the permissions of another role by including a reference to the junior roles Policy Permission Set in the senior roles Policy Permission Set.
9 On XACML, role-based access control, and health grids 09 An Example We will consider a health grid with just five users and four roles, with the roles being Doctor, Nurse, Administrator and Security Cleared. Some users have multiple roles as indicated in the sets below. User 1-> Doctor User 2-> Nurse User 3-> Nurse, Admin User 4-> Admin User 5-> Doctor, Security The roles have the following relationships. nurses are more junior than doctors; and administrators are more junior than doctors.
10 On XACML, role-based access control, and health grids 10 The permitted actions for each of the roles are summarised in the following rules. Doctors can prescribe drugs. Nurses can administer drugs. Administrators can modify patient records. You need to be both a Nurse and an Administrator to register a new patient. Security cleared personal are the only ones that can deal with secret patients.
11 On XACML, role-based access control, and health grids 11 The following should be noted: the first three rules grant permissions to a specific role; the fourth rule requires two roles for an action to be permitted; and the fifth rule restricts permissions given in the previous rules.
12 On XACML, role-based access control, and health grids 12 Implementation using the RBAC Profile To define the policies needed for the first three rules is straightforward using the XACML RBAC profile. The doctor Permission Policy Set would contain a reference to both the nurse Permission Policy Set and the administrator Permission Policy Set, and, as such, would only need to contain details of the prescribe action. The administer action would be part of the nurse Permission Policy Set. The modify action would be part of the administrator Permission Policy Set.
13 On XACML, role-based access control, and health grids 13 The fourth rule states that one needs to be both a nurse and an administrator to register a new patient. A new Role Policy Set can be written that applies only to users who have both the role nurse and the role administrator. However, this has the drawback that doctors who are senior to both nurses and administrators would not automatically gain the right to register new patients. An additional reference needs to be added to the doctor Permission Policy Set so that it inherites the permissions of the combined nurse and administrator Permission Policy Set.
14 On XACML, role-based access control, and health grids 14 The fifth rule is more complicated as it restricts permissions that have already been given in previous rules. In generic XACML policies it is possible to combine conflicting results using a range of different algorithms. In the RBAC profile the algorithm used is permit overrides, which allows permission to be granted if any of the Permission Policy Sets give permission to an action. To add the fifth rule would require the use of a different algorithm such as deny overrides, which would only give permission for an action if there is at least one policy that permits the action and none of the other policies deny the action. Using deny overrides would not be in keeping with the RBAC profile, but is a perfectly valid thing to do in a generic XACML policy set.
15 On XACML, role-based access control, and health grids 15 Possible Solutions The problems that were found when trying to use the RBAC profile associated with our example were, in part, due to the desire to represent the hierarchy of roles by including a reference to one Permission Policy Set wihin another. In addition, the decomposition of policies by role may not be the most natural way to structure a set of policies for a particular access control scenario. What would be more desirable would be to have the ability to ask the question does the subject of the request have role X? either directly or through having a role that is senior to role X.
16 On XACML, role-based access control, and health grids 16 The simple solution to this problem is to define a subject attribute for each role. Such an attribute would be a Boolean attribute that represents the notion of having the permissions of that role. As this attribute respects the role hierarchy it will not be necessary to refer to one Permission Policy Set within another as the subject will appear to have all roles junior to those it possesses. The problem with this simple solution is that it requires calculations to be performed outside of the PDP. This involves extending the functionality of the system making it specific to a single implementation; as such it cannot be thought of as a generic solution.
17 On XACML, role-based access control, and health grids 17 An Alternative Implementation Built using the Sun Microsystems implementation of the XACML standard. Added a new attribute type called string-pair type can be defined in the following way. <AttributeValue DataType="string-pair">(Doctor,Nurse)</AttributeValue> Added a new function, called is-role-function, which takes three arguments: a bag of string-pair, which contains the role hierarchy; a bag of string, which represents all of the subjects a string, which represents the role which is required. The function returns true if the required role is junior or equal to any of the subjects roles and false otherwise.
18 On XACML, role-based access control, and health grids 18 The function can be used either using a local role hierarchy, <Condition FunctionId="is-role-function"> <Apply FunctionId="urn:oasis:names:tc:xacml:1.0:function:string-pair-bag"> <AttributeValue DataType="tuple">Doctor,Nurse</AttributeValue> <AttributeValue DataType="tuple">Doctor,Admin</AttributeValue> </Apply> <SubjectAttributeDesignator DataType=" AttributeId="roles" /> <AttributeValue DataType=" </Condition> or one defined in the enviroment. <Condition FunctionId="is-role-function"> <EnvironmentAttributeDesignator DataType=" AttributeId="role-hierarchy" /> <SubjectAttributeDesignator DataType=" AttributeId="roles" /> <AttributeValue DataType=" </Condition>
19 On XACML, role-based access control, and health grids 19 Conclusions and Further Work The RBAC profile for XACML aims to provide support for role-based policies while retaining the full expressive power of generic XACML. It is capable of handling role hierarchies using an inclusion mechanism which allows the permissions of one role to be inherited by another role. With the aid of a simple example we have shown that use of the RBAC profile places undesirable constraints on the policies that can be constructed. Two possible alternative mechanisms were proposed: the first assumes that the context handler knows how to evaluate role inheritance; the second extends the language to support a pair of strings data type and adds a custom function to handle role hierarchies.
20 On XACML, role-based access control, and health grids 20 Both of the proposed mechanisms either involve storing the role hierarchies outside of the policies or repeatedly stating definitions on every usage in every policy file in which they are used. This is not desirable as the role hierarchies are very much part of the policy and repeating the definitions may lead to discrepancies. Using the alternative of allowing declarations of attributes as part of a policy, coupled with an extension to the policy reference mechanism that is currently available, will allow data members representing role hierarchies to be shared between policies and policy sets from a single file. Other avenues for future work include extending the pair datatype to handle arbitrary tuples. This would be desirable for many contexts, not least of which is the representation of results from database queries.
21 On XACML, role-based access control, and health grids 21 Summary Background XACML Role Based Access Control An Example Implementation using the RBAC Profile Possible Solutions An Alternative Implementation Conclusions and Further Work
XACML Profile for Role Based Access Control (RBAC)
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 XACML Profile for Role Based Access Control (RBAC) Committee Draft 01, 13 February 2004 Document identifier: cs-xacml-rbac-profile-01 Location:
A Model for Access Control Management in Distributed Networks
A Model for Access Control Management in Distributed Networks Master of Science Thesis Azadeh Bararsani Supervisor/Examiner: Dr. Johan Montelius Royal Institute of Technology (KTH), Stockholm, Sweden,
Using XACML Policies as OAuth Scope
Using XACML Policies as OAuth Scope Hal Lockhart Oracle I have been exploring the possibility of expressing the Scope of an OAuth Access Token by using XACML policies. In this document I will first describe
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
XACML. extensible Access Control Markup Language
XACML extensible Access Control Markup Language Author Coordinator Doutor Diogo Gomes Collaborator Engenheiro Ricardo Azevedo Universidade de Aveiro Instituto de Telecomunicações Portugal Telecom Inovação
Using XACML and SAML for Authorisation messaging and assertions: XACML and SAML standards overview and usage examples
Using XACML and SAML for Authorisation messaging and assertions: XACML and SAML standards overview and usage examples Draft version 0.2. - March 28, 2005 Yuri Demchenko Abstracts
Identity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP [email protected]. http://www.owasp.
Identity Management Basics Derek Browne, CISSP, ISSAP [email protected] May 9, 2007 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms
Authorization-Authentication Using
School of Computing Science, University of Newcastle upon Tyne Authorization-Authentication Using XACML and SAML Jake Wu and Panos Periorellis Technical Report Series CS-TR-907 May 2005 Copyright c 2004
White Paper The Identity & Access Management (R)evolution
White Paper The Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 A New Perspective on Identity & Access Management Executive Summary Identity & Access Management
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations
SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness
Interoperability Summit 2002 SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness Gavenraj Sodhi Senior Technology Analyst Provisioning
Electronic Health Network - Case Study Consent2Share Share with Confidence
Electronic Health Network - Case Study Consent2Share Share with Confidence Jan 2015 About Consent2Share Complying with privacy regulations in an electronic environment is a very complex process. The Consent2Share
XACML and Access Management. A Business Case for Fine-Grained Authorization and Centralized Policy Management
A Business Case for Fine-Grained Authorization and Centralized Policy Management Dissolving Infrastructures A recent Roundtable with CIOs from a dozen multinational companies concurred that Identity &
How To Manage A Password Management System
FAKULTÄT FÜR INFORMATIK DER TECHNISCHEN UNIVERSITÄT MÜNCHEN Master s thesis in computer science Privileged User Password Management in Shared Environments Manuel Söhner FAKULTÄT FÜR INFORMATIK DER TECHNISCHEN
CHAPTER - 3 WEB APPLICATION AND SECURITY
CHAPTER - 3 WEB APPLICATION AND SECURITY 3.1 Introduction Web application or Wepapp is the general term that is normally used to refer to all distributed web-based applications. According to the more technical
The XACML Enabled Gateway The Entrance to a New SOA Ecosystem
The XACML Enabled Gateway The Entrance to a New SOA Ecosystem White Paper Intel SOA Expressway and Axiomatics Policy Server Solution Intel SOA Expressway and Axiomatics Policy Server combined provide a
December 2014 Keywords/Summary
December 2014 Keywords/Summary: SAML, OpenID, OAuth, XACML, Identity, Authentication, Authorization, Accounting, Federation, Auditing, Meta-Users, Meta-Attributes, Stores, RBAC, Roles, Access Contents
Entitlements Access Management for Software Developers
Entitlements Access Management for Software Developers Market Environment The use of fine grained entitlements and obligations control for access to sensitive information and services in software applications
A Comparison of Attribute Based Access Control (ABAC) Standards for Data Services
1 2 3 4 5 6 DRAFT NIST Special Publication 800-178 A Comparison of Attribute Based Access Control (ABAC) Standards for Data Services Extensible Access Control Markup Language (XACML) and Next Generation
2. Create (if required) 3. Register. 4.Get policy files for policy enforced by the container or middleware eg: Gridmap file
Policy Management for OGSA Applications as Grid Services (Work in Progress) Lavanya Ramakrishnan MCNC-RDI Research and Development Institute 3021 Cornwallis Road, P.O. Box 13910, Research Triangle Park,
Completeness, Versatility, and Practicality in Role Based Administration
Completeness, Versatility, and Practicality in Role Based Administration Slobodan Vukanović [email protected] Abstract Applying role based administration to role based access control systems has
A logical approach to dynamic role-based access control
A logical approach to dynamic role-based access control Philippe Balbiani Yannick Chevalier Marwa El Houri Abstract Since its formalization RBAC has become the yardstick for the evaluation of access control
Meta Model Based Integration of Role-Based and Discretionary Access Control Using Path Expressions
Meta Model Based Integration of Role-Based and Discretionary Access Control Using Path Expressions Kathrin Lehmann, Florian Matthes Chair for Software Engineering for Business Information Systems Technische
Role based access control in a telecommunications operations and maintenance network
Final thesis Role based access control in a telecommunications operations and maintenance network Performed for Ericsson AB by Peter Gunnarsson LITH-IDA-EX 05/012 SE 2005-03-01 Final thesis Role based
SAML and XACML Overview. Prepared by Abbie Barbir, [email protected] Nortel Canada April 25, 2006
SAML and XACML Overview Prepared by Abbie Barbir, [email protected] Nortel Canada April 25, 2006 Acknowledgements Some slides are provided by > Eve Maler, Sun Microsystems > Hal Lockhart, BEA 2 Agenda
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
Digital Policy Management Framework for Attribute-Based Access Control
Digital Policy Management Framework for Attribute-Based Access Control Contract Milestone Task 12.1 19 December 2014 The Johns Hopkins University Applied Physics Laboratory Table of Contents Executive
IHE IT Infrastructure Technical Framework Supplement. Secure Retrieve (SeR) Trial Implementation
Integrating the Healthcare Enterprise 5 IHE IT Infrastructure Technical Framework Supplement 10 Secure Retrieve (SeR) 15 Trial Implementation 20 Date: August 31, 2015 Author: IHE ITI Technical Committee
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
A logical approach to role-based access control in a distributed environment
A logical approach to role-based access control in a distributed environment Université Paul Sabatier, IRIT COPS - February 2008 Motivation Express access control policies in distributed systems. Take
Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks
Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks Ramaswamy Chandramouli National Institute of Standards and Technology Gaithersburg, MD 20899,USA 001-301-975-5013 [email protected]
Integrating XACML into JAX-WS and WSIT
Integrating XACML into JAX-WS and WSIT Prof. Dr. Eric Dubuis Berner Fachhochschule Biel May 25, 2012 Overview Problem and Motivation Enforcing the Access Policy JAX-WS Handler Framework WSIT Validators
Access Control of Cloud Service Based on UCON
Access Control of Cloud Service Based on UCON Chen Danwei, Huang Xiuli, and Ren Xunyi Nanjing University of posts & Telecommunications, New Model Street No.66, 210003, Nanjing, China [email protected],
CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS
CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS Shilpa G S 1, Maria Navin J R 2 1 PG Student, Dept. of Computer Science and Engineering, SVCE Bangalore,
Access Control Models Part I. Murat Kantarcioglu UT Dallas
UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control Models Part I Murat Kantarcioglu UT Dallas Introduction Two main categories: Discretionary Access Control Models (DAC) Definition:
Access Control Framework of Personal Cloud based on XACML
Access Control Framework of Personal Cloud based on XACML 1 Jun-Young Park, 2 Young-Rok Shin, 3 Kyoung-Hun Kim, 4 Eui-Nam Huh 1First Author, 2 Kyung Hee University, {parkhans, shinyr}@khu.ac.kr 3 Gangdong
Medicines for Human Use (Clinical Trials Regulations) 2004. Informed consent in clinical trials
Medicines for Human Use (Clinical Trials Regulations) 2004 Informed consent in clinical trials Introduction 1. This information note summarises the statutory requirements for informed consent of participants
Access Control in Distributed Systems. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control in Distributed Systems Murat Kantarcioglu Topics Overview SAML XACML Overview Security for distributed systems has been widely
Role-Based Access Control (RBAC) Role Engineering Process Version 3.0
Role-Based Access Control (RBAC) Role Engineering Process Version 3.0 Developed For: The Healthcare RBAC Task Force Developed by: Science Applications International Corporation (SAIC) TABLE OF CONTENTS
Whitepaper: Manage Access Control for Network Resources with Securitay s Security Policy Manager
Whitepaper: Manage Access Control for Network Resources with Securitay s Security Policy Manager Introduction The past several years has seen an increase in the amount of attention paid to security management
Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn
Best Practices, Procedures and Methods for Access Control Management Michael Haythorn July 13, 2013 Table of Contents Abstract... 2 What is Access?... 3 Access Control... 3 Identification... 3 Authentication...
Role Based Access Control Framework for Network Enterprises
Role Based Access Control Framework for Network Enterprises Dan Thomsen, Dick O Brien, and Jessica Bogle Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113 [email protected]
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0
sm Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Related Usage Models... 5 Reference Framework...
A CROSS - DOMAIN ROLE MAPPING AND AUTHORIZATION FRAMEWORK FOR RBAC IN GRID SYSTEMS
International Journal of Computer Science and Applications c 2009 Technomathematics Research Foundation Vol.6 No.1, pp. 1-12 A CROSS - DOMAIN ROLE MAPPING AND AUTHORIZATION FRAMEWORK FOR RBAC IN GRID SYSTEMS
A Security Framework for Access Control in Web Services
A Security Framework for Access Control in Web Services Abolfazl Esfandi, Mehdi Sabbari Department of Computer Engineering Islamic Azad University Borujerd Branch, Iran ABSTRACT In this article, we focus
THE BCS PROFESSIONAL EXAMINATIONS Professional Graduate Diploma. Advanced Database Management Systems
THE BCS PROFESSIONAL EXAMINATIONS Professional Graduate Diploma April 2007 EXAMINERS' REPORT Advanced Database Management Systems General Comment The performance of this paper is similar to previous years.
Extended RBAC Based Design and Implementation for a Secure Data Warehouse
Extended RBAC Based Design and Implementation for a Data Warehouse Dr. Bhavani Thuraisingham The University of Texas at Dallas [email protected] Srinivasan Iyer The University of Texas
The Leeds Teaching Hospitals NHS Trust. Research & Development Department DATA PROTECTION IN RESEARCH GUIDANCE NOTES FOR RESEARCHERS
The Leeds Teaching Hospitals NHS Trust Research & Development Department DATA PROTECTION IN RESEARCH GUIDANCE NOTES FOR RESEARCHERS 1. Introduction The Research Governance Framework for Health & Social
Management of Exceptions on Access Control Policies
Management of Exceptions on Access Control Policies J. G. Alfaro 1,2, F. Cuppens 1, and N. Cuppens-Boulahia 1 1 GET/ENST-Bretagne, 35576 Cesson Sévigné - France, {frederic.cuppens,nora.cuppens}@enst-bretagne.fr
Application Centric Infrastructure Object-Oriented Data Model: Gain Advanced Network Control and Programmability
White Paper Application Centric Infrastructure Object-Oriented Data Model: Gain Advanced Network Control and Programmability What You Will Learn This document discusses application centric infrastructure
This Working Paper provides an introduction to the web services security standards.
International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand
New criteria for assessing a technological design
New criteria for assessing a technological design Kees van Hee and Kees van Overveld April 2012 1. Introduction In 2010 we developed a set of criteria for the evaluation of technological design projects
A Naïve Approach for Managing Virtualized Resources and Optimistic cost
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 3 (2012), pp. 167-171 International Research Publications House http://www. ripublication.com A Naïve Approach
Panorama Overview. Palo Alto Networks. Panorama Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Panorama Overview Palo Alto Networks Panorama Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
System Center Configuration Manager
System Center Configuration Manager Software Update Management Guide Friday, 26 February 2010 Version 1.0.0.0 Baseline Prepared by Microsoft Copyright This document and/or software ( this Content ) has
Controlling Database Access by Providing Access Permissions on Database Objects
International Journal of Scientific & Engineering Research, Volume 4, Issue 4, April-2013 1215 Controlling Database Access by Providing Access Permissions on Database Objects 1 Manushi Majumdar, 2 Anu
Use Cases. Massimo Felici. Massimo Felici Use Cases c 2004 2011
Use Cases Massimo Felici Use Cases 1 Support requirements engineering activities and the requirement process Capture what a system is supposed to do, i.e., systems functional requirements Describe sequences
TECHNOLOGY Computer Programming II Grade: 9-12 Standard 2: Technology and Society Interaction
Standard 2: Technology and Society Interaction Technology and Ethics Analyze legal technology issues and formulate solutions and strategies that foster responsible technology usage. 1. Practice responsible
OpenID and identity management in consumer services on the Internet
OpenID and identity management in consumer services on the Internet Kari Helenius Helsinki University of Technology [email protected] Abstract With new services emerging on the Internet daily, users need
Apache Sling A REST-based Web Application Framework Carsten Ziegeler [email protected] ApacheCon NA 2014
Apache Sling A REST-based Web Application Framework Carsten Ziegeler [email protected] ApacheCon NA 2014 About [email protected] @cziegeler RnD Team at Adobe Research Switzerland Member of the Apache
NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0
NASCIO EA Development Tool-Kit Solution Architecture Version 3.0 October 2004 TABLE OF CONTENTS SOLUTION ARCHITECTURE...1 Introduction...1 Benefits...3 Link to Implementation Planning...4 Definitions...5
A. TRUE-FALSE: GROUP 2 PRACTICE EXAMPLES FOR THE REVIEW QUIZ:
GROUP 2 PRACTICE EXAMPLES FOR THE REVIEW QUIZ: Review Quiz will contain very similar question as below. Some questions may even be repeated. The order of the questions are random and are not in order of
Toward a Usage-Based Security Framework for Collaborative Computing Systems
Toward a Usage-Based Security Framework for Collaborative Computing Systems XINWEN ZHANG Samsung Information Systems America MASAYUKI NAKAE NEC Corporation MICHAEL J. COVINGTON Intel Corporation and RAVI
On the general structure of ontologies of instructional models
On the general structure of ontologies of instructional models Miguel-Angel Sicilia Information Engineering Research Unit Computer Science Dept., University of Alcalá Ctra. Barcelona km. 33.6 28871 Alcalá
Web Application Access Control with Java SE Security
Web Application Access Control with Java SE Security Java Forum Stuttgart 2009 Jürgen Groothues Stuttgart, Agenda 1. Access Control Basics 2. The Java Authentication and Authorization Service (JAAS) 3.
THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS
THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS David L. Spooner Computer Science Department Rensselaer Polytechnic Institute Troy, New York 12180 The object-oriented programming
SharePoint Training DVD Videos
SharePoint Training DVD Videos SharePoint 2013 Administration Intended for: Prerequisites: Hours: Enterprise Content Managers / Administrators Planners / Project managers None 16 hours of video + 18 hours
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart [email protected]
Authentication and Authorization Systems in Cloud Environments
Authentication and Authorization Systems in Cloud Environments DAVIT HAKOBYAN Master of Science Thesis Stockholm, Sweden 2012 TRITA-ICT-EX-2012:203 Abstract The emergence of cloud computing paradigm offers
Identity Security Using Authentication and Authorization in Cloud Computing
Identity Security Using Authentication and Authorization in Cloud Computing D.Ranjith #1, J.Srinivasan *2 # Department of Computer Science and Applications, Adhiparasakthi College of Arts and Science,Kalavai,Vellore-632506
Agenda. 2014 SAP AG or an SAP affiliate company. All rights reserved. 2
NextLabs: Beyond RBAC ABAC and Information Control Automation Tim Quan, Director - SAP Industries & Solutions, NextLabs March 2014 Agenda Common Challenges to Role Based Access Control (RBAC) Information
