Sciweavers

370 search results - page 4 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
MODELS
2007
Springer
15 years 3 months ago
Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with Sectet
Abstract. This contribution gives an overview of various access control strategies in use in contemporary healthcare scenarios and shows how a broad variety of respective policies ...
Michael Hafner, Mukhtiar Memon, Muhammad Alam
SACMAT
2010
ACM
14 years 7 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
HICSS
2006
IEEE
90views Biometrics» more  HICSS 2006»
15 years 3 months ago
The Role of Perceived Control, Attention-Shaping, and Expertise in IT Project Risk Assessment
This study investigates how individuals assess risks in IT development projects under different conditions. We focus on three conditions: the perceived control over the IT project...
Stephen Du, Mark Keil, Lars Mathiassen, Yide Shen,...
HICSS
2009
IEEE
97views Biometrics» more  HICSS 2009»
15 years 4 months ago
Selecting Web Services and Participants for Enforcing Workflow Access Control
Web services have emerged as a de facto standard for encapsulating services within or across organization boundaries. Various proposals have been made to compose Web services into...
San-Yih Hwang, Chuan Yin, Chien-Hsiang Lee
ENTCS
2006
140views more  ENTCS 2006»
14 years 9 months ago
A Web Service Architecture for Enforcing Access Control Policies
Web services represent a challenge and an opportunity for organizations wishing to expose product and services offerings through the Internet. The Web service technology provides ...
Claudio Agostino Ardagna, Ernesto Damiani, Sabrina...