secure interoperation
Recently Published Documents


TOTAL DOCUMENTS

31
(FIVE YEARS 0)

H-INDEX

7
(FIVE YEARS 0)

2014 ◽  
Vol 519-520 ◽  
pp. 181-184
Author(s):  
Jian Feng Lu ◽  
Xuan Yan ◽  
Yi Ding Liu

Role mapping is a basic technique for facilitating interoperation in RBAC-based collaborating environments. However, role mapping lacks the flexibility to specify access control policies in the scenarios where the access control is not a simple action, but consists of a sequence of actions and events from subjects and system. In this paper, we propose an attribute mapping technique to establish secure context in multi-domain environments. We first classify attributes into eight types and show that only two types of attributes need to be translated. We second give the definition of attribute mapping technique, and analysis the properties of attribute mapping. Finally, we study how cardinality constraint violation arises and shows that it is efficient to resolve this security violation.


2013 ◽  
Vol 32 (12) ◽  
pp. 3422-3425
Author(s):  
Chun-xiao YE ◽  
Dong-heng GUO

2011 ◽  
Vol 33 (6) ◽  
pp. 533-540 ◽  
Author(s):  
Jianyong Chen ◽  
Guihua Wu ◽  
Zhen Ji

2009 ◽  
Vol 4 (4) ◽  
pp. 223 ◽  
Author(s):  
Hejiao Huang ◽  
Helene Kirchner ◽  
Songyun Liu ◽  
Weili Wu

Sign in / Sign up

Export Citation Format

Share Document