Conflicts in policy-based distributed systems management

EC Lupu, M Sloman - IEEE Transactions on software …, 1999 - ieeexplore.ieee.org
Modern distributed systems contain a large number of objects and must be capable of
evolving, without shutting down the complete system, to cater for changing requirements …

Conflict analysis for management policies

E Lupu, M Sloman - … Network Management V: Integrated management in a …, 1997 - Springer
Policies are a means of influencing management behaviour within a distributed system,
without coding the behaviour into the managers. Authorisation policies specify what …

[图书][B] IT-security and privacy: design and use of privacy-enhancing security mechanisms

S Fischer-Hübner - 2001 - Springer
3 IT-Security Page 1 3 IT-Security 3.1. Definition IT (Information Technology) Security
mechanisms are needed to protect personal data and thus IT Security is often regarded as the …

Towards a role-based framework for distributed systems management

EC Lupu, M Sloman - Journal of Network and Systems Management, 1997 - Springer
Roles have been widely used for modeling theauthority, responsibility, functions, and
interactions, associated with manager positions within organizations. In this paper, we …

Policy ratification

D Agrawal, J Giles, KW Lee… - Sixth IEEE International …, 2005 - ieeexplore.ieee.org
It is not sufficient to merely check the syntax of new policies before they are deployed in a
system; policies need to be analyzed for their interactions with each other and with their …

A cryptographic solution to implement access control in a hierarchy and more

I Ray, I Ray, N Narasimhamurthi - … of the seventh ACM symposium on …, 2002 - dl.acm.org
The need for access control in a hierarchy arises in several different contexts. One such
context is managing the information of an organization where the users are divided into …

[PDF][PDF] A role based framework for distributed systems management

EC Lupu - 1998 - researchgate.net
Distributed systems management faces new challenges due to an exponential increase in
the size of networked environments. New paradigms that devolve management control and …

A model for evaluation and administration of security in object-oriented databases

EB Fernandez, E Gudes, H Song - IEEE Transactions on …, 1994 - ieeexplore.ieee.org
The integration of object-oriented programming concepts with databases is one of the most
significant advances in the evolution of database systems. Many aspects of such a …

Argos—A configurable access control system for interoperable environments

D Jonscher, KR Dittrich - Database Security IX: Status and Prospects, 1996 - Springer
The integration of autonomous information systems causes a fundamental problem for
security management. How to ensure a consistent authorisation state if several independent …

[PDF][PDF] A model of methods access authorization in object-oriented databases

N Gal, E Gudesl, EB Fernandez - 1993 - researchgate.net
Object-oriented databases are a recent and important development and many studies of
them have been performed. These consider aspects such as data modeling, query …