Sciweavers

DBSEC
2008
107views Database» more  DBSEC 2008»
13 years 6 months ago
Regulating Exceptions in Healthcare Using Policy Spaces
One truth holds for the healthcare industry - nothing should interfere with the delivery of care. Given this fact, the access control mechanisms used in healthcare to regulate and ...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
DBSEC
2008
188views Database» more  DBSEC 2008»
13 years 6 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
DBSEC
2007
87views Database» more  DBSEC 2007»
13 years 6 months ago
Towards a Times-Based Usage Control Model
Abstract. Modern information systems require temporal and privilegeconsuming usage of digital objects. To meet these requirements, we present a new access control model–Times-bas...
Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaoli...
DBSEC
2007
138views Database» more  DBSEC 2007»
13 years 6 months ago
A Spatio-temporal Role-Based Access Control Model
With the growing advancement of pervasive computing technologies, we are moving towards an era where spatio-temporal information will be necessary for access control. The use of su...
Indrakshi Ray, Manachai Toahchoodee
DBSEC
2007
121views Database» more  DBSEC 2007»
13 years 6 months ago
XACML Policies for Exclusive Resource Usage
The extensible access control markup language (XACML) is the standard access control policy specification language of the World Wide Web. XACML does not provide exclusive accesse...
Vijayant Dhankhar, Saket Kaushik, Duminda Wijeseke...
DBSEC
2007
131views Database» more  DBSEC 2007»
13 years 6 months ago
Dynamic Event-Based Access Control as Term Rewriting
Abstract. Despite the widespread adoption of Role-based Access Control (RBAC) models, new access control models are required for new applications for which RBAC may not be especial...
Clara Bertolissi, Maribel Fernández, Steve ...
CSREASAM
2007
13 years 6 months ago
Contextual Risk-Based Access Control
- Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. However, these strategies are in...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
DBSEC
2010
162views Database» more  DBSEC 2010»
13 years 6 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
DBSEC
2010
137views Database» more  DBSEC 2010»
13 years 6 months ago
Constructing Key Assignment Schemes from Chain Partitions
Abstract. In considering a problem in access control for scalable multimedia formats, we have developed new methods for constructing a key assignment scheme. Our first contribution...
Jason Crampton, Rosli Daud, Keith M. Martin
AMW
2010
13 years 6 months ago
Chasing after Secrets in Relational Databases
Abstract. Inference control can guarantee confidentiality but is costly to implement. Access control can be implemented efficiently but cannot guarantee confidentiality. Hence, it ...
Joachim Biskup, Sven Hartmann, Sebastian Link, Jan...