Organizational Information Systems (IS) collect, store, and manage personal and business data. Due to regulation laws and to protect the privacy of users, clients, and business partners, these data must be kept private. This paper proposes a model and a mechanism that allows defining access control policies based on the user profile, the time period, the mode and the location from where data can be accessed. The proposed policy model is simple enough to be used by a business manager, yet it has the flexibility to define complex restrictions. At runtime, a protection layer monitors data accesses and enforces existing policies. A prototype tool was implemented to run an experimental evaluation, which showed that the tool is able to enforce ac...
Increasing amounts of data are being collected and stored relating to every aspect of an individual'...
We present an approach for controlling access to data publishers in the framework of Web-based infor...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
Protecting data over the web is today a crucial need for many companies and organizations. This requ...
As organizations depend on, possibly distributed, information systems for operational, decisional an...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
This paper is a natural continuation of previous research on the implementation of confidentiality i...
XML documents usually contain private information that cannot be shared by every user communities. I...
Data privacy is one of the fundamental needs of the people. In a computing environment, there are va...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
International audienceThe erosion of trust put in traditional database servers and in Database Servi...
A practical mandatory access control (MAC) model for XML databases is presented in this paper. The ...
Abstract: A large number of organizations have implemented security or privacy policies through clas...
Increasing amounts of data are being collected and stored relating to every aspect of an individual'...
We present an approach for controlling access to data publishers in the framework of Web-based infor...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
Protecting data over the web is today a crucial need for many companies and organizations. This requ...
As organizations depend on, possibly distributed, information systems for operational, decisional an...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
This paper is a natural continuation of previous research on the implementation of confidentiality i...
XML documents usually contain private information that cannot be shared by every user communities. I...
Data privacy is one of the fundamental needs of the people. In a computing environment, there are va...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
International audienceThe erosion of trust put in traditional database servers and in Database Servi...
A practical mandatory access control (MAC) model for XML databases is presented in this paper. The ...
Abstract: A large number of organizations have implemented security or privacy policies through clas...
Increasing amounts of data are being collected and stored relating to every aspect of an individual'...
We present an approach for controlling access to data publishers in the framework of Web-based infor...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...