語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Role-Based Access Control Administra...
~
Kibwage, Stephen Sakawa.
FindBook
Google Book
Amazon
博客來
Role-Based Access Control Administration of Security Policies and Policy Conflict Resolution in Distributed Systems.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Role-Based Access Control Administration of Security Policies and Policy Conflict Resolution in Distributed Systems./
作者:
Kibwage, Stephen Sakawa.
面頁冊數:
110 p.
附註:
Source: Dissertation Abstracts International, Volume: 76-07(E), Section: A.
Contained By:
Dissertation Abstracts International76-07A(E).
標題:
Information science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3682683
ISBN:
9781321564051
Role-Based Access Control Administration of Security Policies and Policy Conflict Resolution in Distributed Systems.
Kibwage, Stephen Sakawa.
Role-Based Access Control Administration of Security Policies and Policy Conflict Resolution in Distributed Systems.
- 110 p.
Source: Dissertation Abstracts International, Volume: 76-07(E), Section: A.
Thesis (Ph.D.)--Nova Southeastern University, 2015.
Security models using access control policies have over the years improved from Role-based access control (RBAC) to newer models which have added some features like support for distributed systems and solving problems in older security policy models such as identifying policy conflicts. Access control policies based on hierarchical roles provide more flexibility in controlling system resources for users. The policies allow for granularity when extended to have both allow and deny permissions as well as weighted priority attribute for the rules in the policies. Such flexibility allows administrators to succinctly specify access for their system resources but also prone to conflict.
ISBN: 9781321564051Subjects--Topical Terms:
554358
Information science.
Role-Based Access Control Administration of Security Policies and Policy Conflict Resolution in Distributed Systems.
LDR
:03006nmm a2200301 4500
001
2115905
005
20170417071254.5
008
180830s2015 ||||||||||||||||| ||eng d
020
$a
9781321564051
035
$a
(MiAaPQ)AAI3682683
035
$a
AAI3682683
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Kibwage, Stephen Sakawa.
$3
3277584
245
1 0
$a
Role-Based Access Control Administration of Security Policies and Policy Conflict Resolution in Distributed Systems.
300
$a
110 p.
500
$a
Source: Dissertation Abstracts International, Volume: 76-07(E), Section: A.
500
$a
Adviser: Peixiang Liu.
502
$a
Thesis (Ph.D.)--Nova Southeastern University, 2015.
520
$a
Security models using access control policies have over the years improved from Role-based access control (RBAC) to newer models which have added some features like support for distributed systems and solving problems in older security policy models such as identifying policy conflicts. Access control policies based on hierarchical roles provide more flexibility in controlling system resources for users. The policies allow for granularity when extended to have both allow and deny permissions as well as weighted priority attribute for the rules in the policies. Such flexibility allows administrators to succinctly specify access for their system resources but also prone to conflict.
520
$a
This study found that conflicts in access control policies were still a problem even in recent literature. There have been successful attempts at using algorithms to identify the conflicts. However, the conflicts were only identified but not resolved or averted and system administrators still had to resolve the policy conflicts manually. This study proposed a weighted attribute administration model (WAAM) containing values that feed the calculation of a weighted priority attribute. The values are tied to the user, hierarchical role, and secured objects in a security model to ease their administration and are included in the expression of the access control policy. This study also suggested a weighted attribute algorithm (WAA) using these values to resolve any conflicts in the access control policies. The proposed solution was demonstrated in a simulation that combined the WAAM and WAA. The simulation's database used WAAM and had data records for access control policies, some of which had conflicts. The simulation then showed that WAA could both identify and resolve access control policy (ACP) conflicts while providing results in sub-second time. The WAA is extensible so implementing systems can extend WAA to meet specialized needs. This study shows that ACP conflicts can be identified and resolved during authorization of a user into a system.
590
$a
School code: 1191.
650
4
$a
Information science.
$3
554358
650
4
$a
Information technology.
$3
532993
650
4
$a
Systems science.
$3
3168411
690
$a
0723
690
$a
0489
690
$a
0790
710
2
$a
Nova Southeastern University.
$b
Computer Information Systems (MCIS, DCIS).
$3
1026582
773
0
$t
Dissertation Abstracts International
$g
76-07A(E).
790
$a
1191
791
$a
Ph.D.
792
$a
2015
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3682683
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9326525
電子資源
01.外借(書)_YB
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入