A role-based security architecture for business intelligence

被引:0
|
作者
Megaache, S [1 ]
Karran, T [1 ]
Justo, GRR [1 ]
机构
[1] Univ Westminster, Cavendish Sch Comp Sci, London W1M 8JS, England
来源
TECHNOLOGY OF OBJECT-ORIENTED LANGUAGES AND SYSTEMS - TOOLS 34, PROCEEDINGS | 2000年
关键词
D O I
10.1109/TOOLS.2000.868980
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security is a growing concern to enterprise systems when they become open to e-commerce using the Internet. This is particularly severe in the e-commerce applications using knowledge management systems, which generally maintain critical information about the enterprise. Security usually affects all parts of a system and to be effective must therefore be integrated in the enterprise architecture. This paper describes CODA-a complex organic distributed architecture for modeling distributed knowledge management systems applied to business intelligence; and proposes a security System architecture to be integrated to it. The foundation of the security system is a role-based access control model, which provides all the functionality required by a security system, including authentication and auditing.
引用
收藏
页码:295 / 305
页数:11
相关论文
共 50 条
  • [21] Security analysis of role-based Separation of Duty with workflows
    Hewett, Rattikom
    Kijsanayothin, Phongphun
    Thipse, Aashay
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 765 - 770
  • [22] Analysis, comparison and design of role-based security specifications
    Castano, S
    Martella, G
    Samarati, P
    DATA & KNOWLEDGE ENGINEERING, 1996, 21 (01) : 31 - 55
  • [23] Role-based security for configurable distributed control systems
    Hauf, M
    Schwarz, J
    Polze, A
    SIXTH INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS, PROCEEDINGS, 2001, : 111 - 118
  • [24] A role-based SOA architecture for community support systems
    Xu, Bin
    Yang, Xiaohu
    Shen, Yuanhong
    Li, Shanping
    Ma, Albert
    PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS: CTS 2008, 2008, : 408 - 415
  • [25] Extending the globus architecture with role-based trust management
    Colombo, Maurizio
    Martinelli, Fabio
    Mori, Paolo
    Vaccarelli, Anna
    COMPUTER AIDED SYSTEMS THEORY- EUROCAST 2007, 2007, 4739 : 448 - 456
  • [26] Role-Based Architecture for Secure Management of Telepathology Sessions
    Jesus, Rui
    Nunes, Pedro
    Lebre, Rui
    Costa, Carlos
    DIGITAL PERSONALIZED HEALTH AND MEDICINE, 2020, 270 : 663 - 667
  • [27] Role-based approach to business process simulation modeling and analysis
    Cho, YH
    Kim, JK
    Kim, SH
    COMPUTERS & INDUSTRIAL ENGINEERING, 1998, 35 (1-2) : 343 - 346
  • [28] Blockchain Studio: A Role-Based Business Workflows Management System
    Mercenne, Lucie
    Brousmiche, Kei-Leo
    Ben Hamida, Elyes
    2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 1215 - 1220
  • [29] Extended Role-Based Security System using Context Information
    Li, Xun
    Yoo, Sang Bong
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 503 - 508
  • [30] Role-Based Multiple Controllers for Load Balancing and Security in SDN
    Chourishi, Dharmendra
    Miri, Ali
    Milic, Mihailo
    Ismaeel, Salam
    2015 IEEE CANADA INTERNATIONAL HUMANITARIAN TECHNOLOGY CONFERENCE (IHTC2015), 2015,