Controlled release of information from an organization is becoming important from various considerations: privacy, competitive information protection, strategic data control, and more. In most organizations, data protection is afforded only by using access control. However, it can be argued that access control suffers from at least two problems. First, effective access control assumes a perfect categorization of information ("who can access what"), which is increasingly difficult in a complex information system. Second, access control is not effective against insider attacks, where users with legitimate access rights send out sensitive information, either with malicious intent or by accident. Information release control is viewed as complem...
To effectively participate in modern collaborations, member organizations must be able to share spec...
In a computing system, sensitive data must be protected by release policies that determine which pri...
Abstract. In a database system, authorization-based access-control is generally the first line of de...
Modern information system applications involve collaboration in the form of information flow through...
Many computer systems have a functional requirement to release information. Such requirements are an...
In a computing system, sensitive data must be protected by release policies that determine which pri...
Abstract—While access control mechanisms have existed in computer systems since the 1960s, modern sy...
In a computing system, sensitive data must be protected by release policies that determine which pri...
In a computing system, sensitive data must be protected by release policies that determine which pri...
To effectively participate in modern collaborations, member organizations must be able to share spec...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
To effectively participate in modern collaborations, member organizations must be able to share spec...
To effectively participate in modern collaborations, member organizations must be able to share spec...
To effectively participate in modern collaborations, member organizations must be able to share spec...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
To effectively participate in modern collaborations, member organizations must be able to share spec...
In a computing system, sensitive data must be protected by release policies that determine which pri...
Abstract. In a database system, authorization-based access-control is generally the first line of de...
Modern information system applications involve collaboration in the form of information flow through...
Many computer systems have a functional requirement to release information. Such requirements are an...
In a computing system, sensitive data must be protected by release policies that determine which pri...
Abstract—While access control mechanisms have existed in computer systems since the 1960s, modern sy...
In a computing system, sensitive data must be protected by release policies that determine which pri...
In a computing system, sensitive data must be protected by release policies that determine which pri...
To effectively participate in modern collaborations, member organizations must be able to share spec...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
To effectively participate in modern collaborations, member organizations must be able to share spec...
To effectively participate in modern collaborations, member organizations must be able to share spec...
To effectively participate in modern collaborations, member organizations must be able to share spec...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
To effectively participate in modern collaborations, member organizations must be able to share spec...
In a computing system, sensitive data must be protected by release policies that determine which pri...
Abstract. In a database system, authorization-based access-control is generally the first line of de...