A role-based security architecture for business intelligence

被引:0
|
作者
Megaache, S [1 ]
Karran, T [1 ]
Justo, GRR [1 ]
机构
[1] Univ Westminster, Cavendish Sch Comp Sci, London W1M 8JS, England
关键词
D O I
10.1109/TOOLS.2000.868980
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security is a growing concern to enterprise systems when they become open to e-commerce using the Internet. This is particularly severe in the e-commerce applications using knowledge management systems, which generally maintain critical information about the enterprise. Security usually affects all parts of a system and to be effective must therefore be integrated in the enterprise architecture. This paper describes CODA-a complex organic distributed architecture for modeling distributed knowledge management systems applied to business intelligence; and proposes a security System architecture to be integrated to it. The foundation of the security system is a role-based access control model, which provides all the functionality required by a security system, including authentication and auditing.
引用
收藏
页码:295 / 305
页数:11
相关论文
共 50 条
  • [1] A Multi-Agent Role-Based System for Business Intelligence
    Mabrouk, Tamer F.
    El-Sherbiny, Mohamed M.
    Guirguis, Shawkat K.
    Shawky, Ayman Y.
    INNOVATIONS AND ADVANCES IN COMPUTER SCIENCES AND ENGINEERING, 2010, : 203 - 208
  • [2] A role-based process security model in business process management
    Kim, Kwanghoon
    Kim, Changmain
    Advances in Computational Methods in Sciences and Engineering 2005, Vols 4 A & 4 B, 2005, 4A-4B : 1596 - 1599
  • [3] The application of security policy to role-based access control and the common data security architecture
    Lin, A
    Brown, R
    COMPUTER COMMUNICATIONS, 2000, 23 (17) : 1584 - 1593
  • [4] ROLE-BASED NETWORK SECURITY
    JOLITZ, WF
    JOLITZ, LG
    DR DOBBS JOURNAL, 1995, 20 (05): : 80 - &
  • [5] Role-based security policy
    Ma, Jianping
    Yu, Xiangxuan
    Hong, Fan
    Zhang, Jiangling
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 35 (05): : 447 - 450
  • [6] A role-based access in a hierarchical sensor network architecture to provide multilevel security
    Panja, Biswajit
    Madria, Sanjay Kumar
    Bhargava, Bharat
    COMPUTER COMMUNICATIONS, 2008, 31 (04) : 793 - 806
  • [7] A Role-Based Business Process Modeling Methodology
    Wang, Leizhen
    Wang, Dingwei
    CCDC 2009: 21ST CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, PROCEEDINGS, 2009, : 4881 - +
  • [8] Role-Based Collaboration Model of Security Devices
    Liu Bing
    Song Cheng
    Xin Yang
    Yang Yixian
    Wang Shaobin
    Wei Jiwei
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4581 - +
  • [9] Role-based signature and its security proof
    Lin, Changlu (cllin@fjnu.edu.cn), 1600, Institute of Information Science (32):
  • [10] Realizing MAC in role-based security system
    Li, L.X.
    Cao, J.K.
    Chen, W.M.
    Huang, S.L.
    2001, Shenyang Institute of Computing Technology (22):