Sciweavers

438 search results - page 30 / 88
» Activity-based Access Control Model to Hospital Information
Sort
View
ACSAC
2009
IEEE
15 years 4 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...
VIP
2003
14 years 11 months ago
Web-based Multimedia GP Medical System
This paper introduced GP-Soft, a powerful new patient management system, which is designed to improve the records management for clinic, nursing home and hospital. GP-Soft is a co...
Chee Chern Lim, Man Hing Yu, Jesse J. Jin
COMAD
2008
14 years 11 months ago
The Efficient Maintenance of Access Roles with Role Hiding
Role-based access control (RBAC) has attracted considerable research interest. However, the computational issues of RBAC models are yet to be thoroughly studied. In this paper, we...
Chaoyi Pang, Xiuzhen Zhang, Yanchun Zhang, Kotagir...
DBSEC
2006
115views Database» more  DBSEC 2006»
14 years 11 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
SACMAT
2006
ACM
15 years 3 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov