ABSTRACT
Seeking to fill a gap in licensed software access control solutions, a license management solution based on administrator-controllable policies is presented. This solution, Lisense, is a client-server style license manager and access control solution that can be applied to any application binary without the need to alter source code or recompile the application. While Lisense provides several builtin policies like seat counting and controlling number of concurrent users running a wrapped application simultaneously, it also allows definition of new, external policies via a simple Python API, providing a high level of flexibility to the administrator in designing and developing access control systems beyond those already available. In this paper, we place Lisense in context of other access control solutions available, discuss its implementation, show an example deployment, and utilize the API to write a custom policy.
- flock(1) - linux man page. https://linux.die.net/man/1/flock. Accessed: 2019-02-10.Google Scholar
- Gnu parallel. https://www.gnu.org/software/parallel/. Accessed: 2019-02-10.Google Scholar
- Flexera Software. Flexnet. https://www.flexera.com.Google Scholar
- Reprise Software. Rlm. https://www.reprisesoftware.com.Google Scholar
- StataCorp LLC. Stata. https://www.stata.com.Google Scholar
Index Terms
- A Policy-Driven License Manager for Controlling Access to Arbitrary Applications
Recommendations
A propositional policy algebra for access control
Security-sensitive environments protect their information resources against unauthorized use by enforcing access control mechanisms driven by access control policies. Due to the need to compare, contrast, and compose such protected information resources,...
Access control with IBM Tivoli access manager
Web presence has become a key consideration for the majority of companies and other organizations. Besides being an essential information delivery tool, the Web is increasingly being regarded as an extension of the organization itself, directly ...
Authorized! access denied, unauthorized! access granted
SIN '13: Proceedings of the 6th International Conference on Security of Information and NetworksExisting access control systems are mostly identity-based. However, such access control systems impose risks because recognized identity is not essentially an interpretation of good intentions of access. On the other hand, an un-identified individual ...
Comments