Chandramouli, 2003 - Google Patents
Specification and validation of enterprise access control data for conformance to model and policy constraintsChandramouli, 2003
View PDF- Document ID
- 1134005726302554472
- Author
- Chandramouli R
- Publication year
- Publication venue
- 7th World Multi-conference on Systemics, Cybernetics and Informatics
External Links
Snippet
The effectiveness of an enterprise access control framework depends upon the integrity of the various components or the building blocks used in that framework. The essential components of that framework are:(a) an Enterprise Access Control Model (b) a Validation …
- 238000010200 validation analysis 0 title abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
- G06F17/2247—Tree structured documents; Markup, e.g. Standard Generalized Markup Language [SGML], Document Type Definition [DTD]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30908—Information retrieval; Database structures therefor; File system structures therefor of semistructured data, the undelying structure being taken into account, e.g. mark-up language structure data
- G06F17/30914—Mapping or conversion
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/27—Automatic analysis, e.g. parsing
- G06F17/2705—Parsing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11971997B2 (en) | Systems and methods for automated system requirement analysis | |
| US8140362B2 (en) | Automatically processing dynamic business rules in a content management system | |
| Offutt et al. | Generating test cases for web services using data perturbation | |
| Ferrini et al. | Supporting rbac with xacml+ owl | |
| Hu et al. | Guidelines for access control system evaluation metrics | |
| Kuper et al. | Generalized XML security views | |
| Yu et al. | A formal semantics for P3P | |
| US20030221171A1 (en) | Data dictionary method | |
| Shi et al. | A controlled natural language interface for authoring access control policies | |
| Zhang et al. | Schema based XML security: RBAC approach | |
| Hussein et al. | KGMM-a maturity model for scholarly knowledge graphs based on intertwined human-machine collaboration | |
| Abdelgawad et al. | Synthesizing and analyzing attribute-based access control model generated from natural language policy statements | |
| Jin | Applying model driven architecture approach to model role based access control system | |
| Chandramouli | Specification and validation of enterprise access control data for conformance to model and policy constraints | |
| Chandramouli | A policy validation framework for enterprise authorization specification | |
| Giordano et al. | A system for visual role-based policy modelling | |
| Leung | Professional XML Development with Apache Tools: Xerces, Xalan, FOP, Cocoon, Axis, Xindice | |
| Robles et al. | High-level program properties in Frama-C: definition, verification and deduction | |
| Belokosztolszki | Role-based access control policy administration | |
| Ziring et al. | Specification for the extensible configuration checklist description format (XCCDF) | |
| Bodorik et al. | Consistent privacy preferences (CPP) model, semantics, and properties | |
| Harnoš et al. | Analysis of current trends in the development of DSLs and the possibility of using them in the field of information security | |
| May | Privacy APIs: Formal models for analyzing legal privacy requirements | |
| Puder et al. | Meta—Level Service Type Specifications | |
| Sun et al. | Using usage control to access XML databases |