Systems for allowing users to manage access to their personal data are important for a wide variety of applications including healthcare, where authorised individuals may need to share information in ways that the owner had not anticipated. Simply denying access in unknown cases may hamper critical decisions and affect service delivery. Rather, decisions can be made considering the risk of a given sharing request, and the trustworthiness of the requester. We propose a trust- and risk-aware access control mechanism (TRAAC) and a sparse zone-based policy model, which together allow decision-making on the basis of the requester's trustworthiness with regards to both the information to be shared, and the completion of obligations designed to mi...
The prevailing trend of the seamless digital collec-tion has prompted privacy concerns to the organi...
Access control is a security measure that is employed in computer systems to protect its data from u...
With development of grid technology, sensitive data protection becomes a difficult task for accesses...
Systems for allowing users to manage access to their personal data are important for a wide variety ...
Email\ud Print\ud Request Permissions\ud Systems for allowing users to manage access to their person...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
In dynamic and uncertain environments such as healthcare, where the needs of security and informatio...
The increasing need to share information in dynamic environments has created a requirement for risk-...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
Risk-aware access control systems grant or deny access to resources based on the notion of risk. It ...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
The increasing need to share information in dynamic environments has created a requirement for risk-...
AbstractDifferent from traditional access control technologies, such as discretionary access control...
Especially in biomedical research, individual-level data must be protected due to the sensitivity of...
Summary The security of access and information flow carries with it the risk that resources will be ...
The prevailing trend of the seamless digital collec-tion has prompted privacy concerns to the organi...
Access control is a security measure that is employed in computer systems to protect its data from u...
With development of grid technology, sensitive data protection becomes a difficult task for accesses...
Systems for allowing users to manage access to their personal data are important for a wide variety ...
Email\ud Print\ud Request Permissions\ud Systems for allowing users to manage access to their person...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
In dynamic and uncertain environments such as healthcare, where the needs of security and informatio...
The increasing need to share information in dynamic environments has created a requirement for risk-...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
Risk-aware access control systems grant or deny access to resources based on the notion of risk. It ...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
The increasing need to share information in dynamic environments has created a requirement for risk-...
AbstractDifferent from traditional access control technologies, such as discretionary access control...
Especially in biomedical research, individual-level data must be protected due to the sensitivity of...
Summary The security of access and information flow carries with it the risk that resources will be ...
The prevailing trend of the seamless digital collec-tion has prompted privacy concerns to the organi...
Access control is a security measure that is employed in computer systems to protect its data from u...
With development of grid technology, sensitive data protection becomes a difficult task for accesses...