CMIS ACL-Proposal 26-28 Jan 2009.

Slides:



Advertisements
Similar presentations
W3C XML Schema: what you might not know (and might or might not like!) Noah Mendelsohn Distinguished Engineer IBM Corp. October 10, 2002.
Advertisements

Personas and Scenarios - Reshmi. Personas  Fictional characters created to represent the different user types that might use a site, brand, or product.
DEEDS Meeting Jan., 16th 2007 Dependable, Embedded Systems and Software Group Department of Computer Science Darmstadt University of Technology Attack.
Access Control Intro, DAC and MAC System Security.
11 WORKING WITH GROUPS Chapter 7. Chapter 7: WORKING WITH GROUPS2 CHAPTER OVERVIEW  Understand the functions of groups and how to use them.  Understand.
1 Workshop on Metadata Interoperability for Electronic Records Management November 15, 2001 Archives II, College Park, MD.
Train The Trainer Employee Central Administration
CMIS ACL-PROPOSAL Jan  Motivation: Scenarios  Policies: Recap  ACL Concept  Proposal: Discussion Topics.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Secure Data Storage and Retrieval in the Cloud Bhavani Thuraisingham,
ONLINE DATA STORAGE & DOCUMENTS Lesson 3. Lesson 3 – Online documents In this lesson we will be covering:  Online documents  Compression and expansion.
ADML A result of cooperation and leverage! The Open Group W3C OMG MCC CMU.
UW-Madison PKI Lab Keith Hazelton Principal Investigator, UW-Madison PKI Lab Senior IT Architect, UW-Madison PKI Summit, Snowmass, 9-Aug-01.
Chapter 7 WORKING WITH GROUPS.
CWG2 Tools, Guidelines and Procedures 16 December 2014 ALICE O 2 Asian Workshop
XML, DITA and Content Repurposing By France Baril.
Guide to Operating System Security Chapter 5 File, Directory, and Shared Resource Security.
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
1 A Role Based Administration Model For Attribute Xin Jin, Ram Krishnan, Ravi Sandhu SRAS, Sep 19, 2012 World-Leading Research with Real-World Impact!
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
Storage and NT File System INFO333 – Lecture Mariusz Nowostawski Noria Foukia.
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
CSS Cascading Style Sheets By Garrett Garman. CSS Why use Style Sheets? Separates Appearance and Structure Modularity Quick and Easy changes Flexibility.
Employee Central Administration
 Copyright 2005 Digital Enterprise Research Institute. All rights reserved. Towards Translating between XML and WSML based on mappings between.
Chapter 7: WORKING WITH GROUPS
COMP 6471 Software Design Methodologies Winter 2006 Dr Greg Butler
Software Engineering Project: Research Expert Prabhavathi Kumarasamy Joshua Thompson Paul Varcholik University of Central Florida.
In-Band Access Control Framework Group Name: WG4 SEC Source: Qualcomm Meeting Date: Agenda Item:
Virtis-Opis Beta Testing Todd S. Thompson, PE South Dakota DOT Office of Bridge Design August 3, 2011.
SharePoint Security Fundamentals Introduction to Claims-based Security Configuring Claims-based Security Development Opportunities.
Webservice versioning using osgi Allard Buijze, Jettro Coenradie.
Archival Information Packages for NASA HDF-EOS Data R. Duerr, Kent Yang, Azhar Sikander.
WIKI, WIKI, WIKI! Using a Wiki for Collaborative Classroom Conversations Created by Betsy Hood, WGTE.
In-Band Access Control Framework Group Name: WG4 SEC Source: Qualcomm Meeting Date: Agenda Item:
Document Management Services Jim Metzger, Harland FS John Liston, ASC.
DAV ACLs Lisa Lippert Microsoft. Agenda Background –drafts, terms, how file systems use ACLs –Other ACLs efforts Scenarios Goals –goals, may-haves, won’t-haves.
User Management. Basics SDMS shall maintain a database of all users. SDMS shall maintain a database of all users. SDMS shall not limit the number of registered.
1 Construction Chapter Key Concepts Be familiar with the system construction process. Understand different types of tests and when to use Understand.
DAV ACLs Lisa Dusseault Microsoft. Agenda Background Scenarios Goals.
Primary and Secondary Sources. Primary sources provide firsthand testimony or direct evidence concerning a topic under investigation. They are created.
Legion - A Grid OS. Object Model Everything is object Core objects - processing resource– host object - stable storage - vault object - definition of.
Information explosion 1.4X 44X Empower the UserEnable the Compliance Officer In Place and Extensible Easy for IT Exchange, SharePoint, Windows Outlook,
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Working with Disks Lesson 4. Skills Matrix Technology SkillObjective DomainObjective # Configuring Data Protection Configure data protection6.4 Using.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Semantic Phyloinformatic Web Services Using the EvoInfo Stack Speaker: John Harney LSDIS Lab, Dept. of Computer Science, University of Georgia Mentor(s):
Mairéad Martin The University of Tennessee December 16, 2015 Federated Digital Rights Management.
ICOM TC Charter TC’s Scope –Specify the normative standards for collaboration objects, along with their attributes, relationships, constraints, and behavior,
Synchronise work on DEXs and reference data between PLCS pilots and OASIS/PLCS Workshop #3 10 – 11 November 2004.
Steve Graham WS-ResourceFramework Modeling Stateful Resources With Web services OASIS WSRF TC F2F Wednesday, April 28th, 2004.
A Pattern Language for Parallel Programming Beverly Sanders University of Florida.
DITA TOPICS - ADVANCED. Session Results Topic Types Review Format/Layout Separated from Content DITA Concept Elements Using DITA Concept Elements - Advanced.
1 XACML for RBAC and CADABRA Constrained Delegation and Attribute-Based Role Assignment Brian Garback © Brian Garback 2005.
Authorization PDP GE Course (R4) FIWARE Chapter: Security FIWARE GE: Authorization PDP FIWARE GEri: AuthZForce Authorization PDP Owner: Cyril Dangerville,
Document Management Alliance (DMA)
USING PDF AS SOURCE Liz 1 #stc16 Mike
CSE Operating System Principles File Systems.
1 Compare Versions of MS Project File Guy Gaudreault, PMP MPA – Montreal Chapter October 11, 2006.
ITMT Windows 7 Configuration Chapter 6 – Sharing Resource ITMT 1371 – Windows 7 Configuration 1.
Passing from design to implementation
ArcGIS Workflow Manager: Advanced Workflows and Concepts
Oracle Configurator Cloud
McIDAS-V: Why it’s Based on VisAD and IDV
Name of Author (your name)
Digital Preservation Policies: Technical Considerations
SCENARIO (slide 3) CHOICE A (slide 4) CHOICE B (slide 10)
Chapter 8: Security Policy
9/8/ :03 PM © 2006 Microsoft Corporation. All rights reserved.
ICOM TC Charter TC’s Scope Out of TC’s Scope Call for Participation
Presentation transcript:

CMIS ACL-Proposal 26-28 Jan 2009

Motivation: Scenarios Policies: Recap ACL Concept Proposal: Discussion Topics

Scenarios End-User Collaboration Scenario Development: No permissions used (might be passed through, but not interpreted) Runtime: Admin or enduser knows the permissions, assigned by a user to the documents CMIS Application CMIS Application permissions Documents

Scenarios Background Tasks Development: Usage of Permissions is being coded into the application Runtime: Application per- missions permissions mappings? CMIS Application CMIS Application permissions Documents

Recap CMIS Objects

ACL Concept Policies

ACL Concept Permissions All Write Read WritePolicy Delete WriteProperty WriteContent File Unfile Version READ Read ReadProperty ReadContent ReadPolicy

Discussion Topics Assumption: unified user base  no user discovery, no mapping (within the scope of CMIS) ok ? Scenario: flexible mapping („level 1“) vs. known permissions („level 2“) ? Permissions (Level 2): extended permissions required vs. Read/Write/All ? Modelling of ACLs: Policies vs. Properties ? [if policies] entire ACL vs. individual ACEs as Policy ? Format for ACLs: XACML vs. XML vs. other format ? format for principals (plain ID vs. type info + ID) ? ACL Assignment: atomic action when creating an object vs. inheritance ? ACL Inheritance: on create vs. create + lifetime ?