Sciweavers

316 search results - page 29 / 64
» Conditional Privacy-Aware Role Based Access Control
Sort
View
160
Voted
ICSE
2011
IEEE-ACM
14 years 8 months ago
A lightweight code analysis and its role in evaluation of a dependability case
A dependability case is an explicit, end-to-end argument, based on concrete evidence, that a system satisfies a critical property. We report on a case study constructing a depend...
Joseph P. Near, Aleksandar Milicevic, Eunsuk Kang,...
153
Voted
CSFW
2004
IEEE
15 years 9 months ago
The Consistency of Task-Based Authorization Constraints in Workflow Systems
Workflow management systems (WFMSs) have attracted a lot of interest both in academia and the business community. A workflow consists of a collection of tasks that are organized t...
Kaijun Tan, Jason Crampton, Carl A. Gunter
163
Voted
BPM
2007
Springer
258views Business» more  BPM 2007»
15 years 9 months ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge
ACSAC
2002
IEEE
15 years 10 months ago
A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC Standard
In this paper we describe a mainframe access control system (DENT) and its associated delegated administration tool (DSAS) that were used in a financial institution for over 20 y...
Andrew D. Marshall
151
Voted
ICDCIT
2004
Springer
15 years 10 months ago
Automatic Enforcement of Access Control Policies Among Dynamic Coalitions
The need to securely share information on an ad-hoc basis between collaborating entities is increasingly becoming important. We propose a coalition based access control model (CBAC...
Vijayalakshmi Atluri, Janice Warner