Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Permission (or Privileges)

Advanced Methodologies and Technologies in Business Operations and Management
They are authorizations to perform some action on the system. In computer security literature, the term permission refers to some combination of object and operation. A particular operation used on two different objects represents two distinct permissions, and similarly, two different operations applied to a single object represent two distinct permissions. For example, a bank teller may have permissions to execute debit and credit operations on customer records, through transactions, while an accountant may execute debit and credit operations on the general ledger, which consolidates the bank’s accounting data.
Published in Chapter:
Challenges of Meta Access Control Model Enforcement to an Increased Interoperability
Sérgio Luís Guerreiro (University of Lisbon, Portugal)
DOI: 10.4018/978-1-5225-7362-3.ch018
Abstract
When organizations are collaborating, their access control models need to interoperate. However, there are too many access control model variants, and the interoperability enforcement consumes extra effort. In this context, this chapter identifies the challenges of how to design and enforce a meta-access control model to facilitate the interoperability between the different access control mechanisms available. The problem is posed using an ontological approach. Then, the challenges are explained using a descriptive explanation of the meta access control enforcement. The core issues addressed are access models interoperability, standardization of storage for access data, and provisioning of access models.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Challenges of Meta Access Control Model Enforcement to an Increased Interoperability
They are authorizations to perform some action on the system. In computer security literature, the term permission refers to some combination of object and operation. A particular operation used on two different objects represents two distinct permissions, and similarly, two different operations applied to a single object represent two distinct permissions. For example, a bank teller may have permissions to execute debit and credit operations on customer records, through transactions, while an accountant may execute debit and credit operations on the general ledger, which consolidates the bank’s accounting data.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR