{"title":"Role and task-based access control in the PerDiS groupware platform","authors":"G. Coulouris, J. Dollimore, Marcus Roberts","doi":"10.1145/286884.286908","DOIUrl":null,"url":null,"abstract":"A roleand task-based access control scheme has been developed for use in a class of activities that entail cooperation between principals in a virtual enterprise (VE). Data ownership is associated with the component organisations of a VE, each of which constitutes a trust domain. The role/task model was chosen to meet the requirement for a generic access control scheme independent of application code. The model has been implemented for a software platform that provides shared access to clusters of replicated distributed objects. Implications arising from the integration of the access control model with a data replication scheme are discussed.","PeriodicalId":355233,"journal":{"name":"ACM Workshop on Role-Based Access Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"28","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Workshop on Role-Based Access Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/286884.286908","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 28
Abstract
A roleand task-based access control scheme has been developed for use in a class of activities that entail cooperation between principals in a virtual enterprise (VE). Data ownership is associated with the component organisations of a VE, each of which constitutes a trust domain. The role/task model was chosen to meet the requirement for a generic access control scheme independent of application code. The model has been implemented for a software platform that provides shared access to clusters of replicated distributed objects. Implications arising from the integration of the access control model with a data replication scheme are discussed.