Sciweavers

3899 search results - page 44 / 780
» Argumentation for Access Control
Sort
View
CORR
2010
Springer
116views Education» more  CORR 2010»
14 years 9 months ago
Managing Delegation in Access Control Models
In the field of access control, delegation is an important aspect that is considered as a part of the administration mechanism. Thus, a complete access control must provide a flex...
Meriam Ben-Ghorbel-Talbi, Frédéric C...
ICDIM
2010
IEEE
14 years 9 months ago
Detecting incompleteness in access control policies using data classification schemes
In a set of access control policies, incompleteness is the existence of situations for which no policy applies. Some of these situations can be exploited by attackers, to obtain un...
Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serg...
CBMS
2008
IEEE
15 years 6 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
BPM
2007
Springer
258views Business» more  BPM 2007»
15 years 3 months ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge
ICSE
2007
IEEE-ACM
15 years 12 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin