Current proposals for access control languages cannot specify policies required by specific application scenarios (e.g. a database system to enforce privacy regulations), may also contain design flaws, and are incompatible. In this dissertation, we extend RBAC with new components to meet requirements from privacy-aware access control which is required to enforce privacy laws and regulations in organizational computing environments. We propose an access control language for provenance access control which requires aggregating access decisions from different sources and controlling the access to different sections of provenance information. We investigate various problems in risk-based access control. Risk-based access control is particularly...
Cryptographic access control offers selective access to encrypted data via a combination of key mana...
Part 6: Privacy ProtectionInternational audienceEnterprises collect and use private information for ...
Cryptographic access control promises to offer easily distributed trust and broader applicability, w...
In this article, we introduce a comprehensive framework supporting a privacy-aware access control me...
Over the last few years there has been a rapid development of technologies such as ubiquitous comput...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
Abstract. Privacy is considered critical for all organizations needing to manage individual related ...
The increasing need to share information in dynamic environments has created a requirement for risk-...
We present a role-based access control (RBAC) mechanism for a Web Services based data integration sy...
Provenance access control has been recognized as one of the most important components in an enterpri...
Access control systems must adjust to evolving business needs, such as accommodating new and...
Privacy has been acknowledged to be a critical requirement for many business (and non-business) envi...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
Privacy has been acknowledged to be a critical requirement for many business (and non-business) envi...
Cryptographic access control offers selective access to encrypted data via a combination of key mana...
Part 6: Privacy ProtectionInternational audienceEnterprises collect and use private information for ...
Cryptographic access control promises to offer easily distributed trust and broader applicability, w...
In this article, we introduce a comprehensive framework supporting a privacy-aware access control me...
Over the last few years there has been a rapid development of technologies such as ubiquitous comput...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
Abstract. Privacy is considered critical for all organizations needing to manage individual related ...
The increasing need to share information in dynamic environments has created a requirement for risk-...
We present a role-based access control (RBAC) mechanism for a Web Services based data integration sy...
Provenance access control has been recognized as one of the most important components in an enterpri...
Access control systems must adjust to evolving business needs, such as accommodating new and...
Privacy has been acknowledged to be a critical requirement for many business (and non-business) envi...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
Privacy has been acknowledged to be a critical requirement for many business (and non-business) envi...
Cryptographic access control offers selective access to encrypted data via a combination of key mana...
Part 6: Privacy ProtectionInternational audienceEnterprises collect and use private information for ...
Cryptographic access control promises to offer easily distributed trust and broader applicability, w...