{"title":"协作系统中基于角色的互操作性安全策略","authors":"Khalifa Toumi, A. Cavalli, Mazen El Maarabani","doi":"10.1109/CTS.2012.6261092","DOIUrl":null,"url":null,"abstract":"Access control in a distributed system with external users and various organizations is an important issue in systems' security. A comparative study between the existing models will help both: (1) researchers to propose new formalisms and models adapted to these requirements and (2) developers to choose the adequate ones for their applications. In this paper, we are interested in studying role based interoperability security policies. We propose to classify these models based on some criteria related to collaborative environment. Then, we discuss and detail the characteristics of each one. Finally, we propose some perspectives.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Role based interoperability security policies in collaborative systems\",\"authors\":\"Khalifa Toumi, A. Cavalli, Mazen El Maarabani\",\"doi\":\"10.1109/CTS.2012.6261092\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Access control in a distributed system with external users and various organizations is an important issue in systems' security. A comparative study between the existing models will help both: (1) researchers to propose new formalisms and models adapted to these requirements and (2) developers to choose the adequate ones for their applications. In this paper, we are interested in studying role based interoperability security policies. We propose to classify these models based on some criteria related to collaborative environment. Then, we discuss and detail the characteristics of each one. Finally, we propose some perspectives.\",\"PeriodicalId\":200122,\"journal\":{\"name\":\"2012 International Conference on Collaboration Technologies and Systems (CTS)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-05-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 International Conference on Collaboration Technologies and Systems (CTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CTS.2012.6261092\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Collaboration Technologies and Systems (CTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CTS.2012.6261092","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Role based interoperability security policies in collaborative systems
Access control in a distributed system with external users and various organizations is an important issue in systems' security. A comparative study between the existing models will help both: (1) researchers to propose new formalisms and models adapted to these requirements and (2) developers to choose the adequate ones for their applications. In this paper, we are interested in studying role based interoperability security policies. We propose to classify these models based on some criteria related to collaborative environment. Then, we discuss and detail the characteristics of each one. Finally, we propose some perspectives.