Sciweavers

5252 search results - page 73 / 1051
» Logic in Access Control
Sort
View
IAT
2010
IEEE
15 years 3 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski
CORR
2010
Springer
116views Education» more  CORR 2010»
15 years 2 months ago
Managing Delegation in Access Control Models
In the field of access control, delegation is an important aspect that is considered as a part of the administration mechanism. Thus, a complete access control must provide a flex...
Meriam Ben-Ghorbel-Talbi, Frédéric C...
ICDIM
2010
IEEE
15 years 2 months ago
Detecting incompleteness in access control policies using data classification schemes
In a set of access control policies, incompleteness is the existence of situations for which no policy applies. Some of these situations can be exploited by attackers, to obtain un...
Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serg...
142
Voted
CBMS
2008
IEEE
15 years 12 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
163
Voted
BPM
2007
Springer
258views Business» more  BPM 2007»
15 years 9 months ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge