Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology 2005
DOI: 10.1109/ccst.2005.1594853
|View full text |Cite
|
Sign up to set email alerts
|

A flexible authorization mechanism for virtual organizations

Abstract: Authorization decisions are a critical security concern in today's distributed large information systems. These authorizations are significantly different from those in centralized or smaller systems. Mobile agent technology on the other hand provides a useful tool to explore and facilitate information sharing in distributed systems. However, agents are often restricted by the security problems related to the large scale distributed systems and the multi-user operating system environments within they usually o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2008
2008
2012
2012

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…The process that decomposes a security role follows this order: each other with some level of seniority A_Fs are filled with A_Vs [9] [10]. The structure for every role throughout the collaboration is the same.…”
Section: Figure 2 Role Decompositionmentioning
confidence: 99%
“…The process that decomposes a security role follows this order: each other with some level of seniority A_Fs are filled with A_Vs [9] [10]. The structure for every role throughout the collaboration is the same.…”
Section: Figure 2 Role Decompositionmentioning
confidence: 99%
“…It is therefore evident that a re-definition of the role concept is needed [108]. This is particularly important in a CE where exchanging roles is critical and a common role structure would be handy for all participant organizations [109], [110].…”
Section: The Need For Further Defining a Role Structurementioning
confidence: 99%