Usage control in computer security: A survey
Protecting access to digital resources is one of the fundamental problems recognized in
computer security. As yet it remains a challenging problem to work out, starting from the …
computer security. As yet it remains a challenging problem to work out, starting from the …
How to securely break into RBAC: the BTG-RBAC model
Access control models describe frameworks that dictate how subjects (eg users) access
resources. In the role-based access control (RBAC) model access to resources is based on …
resources. In the role-based access control (RBAC) model access to resources is based on …
Emergency role-based access control (E-RBAC) and analysis of model specifications with alloy
In role-based access control (RBAC), users gain access to predetermined roles and
permissions. Thus, desired results are not achieved in emergency situations through policy …
permissions. Thus, desired results are not achieved in emergency situations through policy …
A novel reference security model with the situation based access policy for accessing ephr data
Abstract Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to
share his/her health records securely with healthcare professional but also to control his/her …
share his/her health records securely with healthcare professional but also to control his/her …
Hardware-accelerated reconstruction of polygonal isosurface representations on unstructured grids
T Klein, S Stegmaier, T Ertl - 12th Pacific Conference on …, 2004 - ieeexplore.ieee.org
Volume visualization using isosurface extraction is a well-researched topic. Research
demonstrated that even for unstructured grids peak performances of millions of tetrahedra …
demonstrated that even for unstructured grids peak performances of millions of tetrahedra …
Usable access control policy and model for healthcare
Access control defines what users can perform within a system. It is usually defined by
software engineers and end users are seldom asked for cooperation. The main objective of …
software engineers and end users are seldom asked for cooperation. The main objective of …
Modeling support for role-based delegation in process-aware information systems
In the paper, an integrated approach for the modeling and enforcement of delegation
policies in process-aware information systems is presented. In particular, a delegation …
policies in process-aware information systems is presented. In particular, a delegation …
Beyond accountability: using obligations to reduce risk exposure and deter insider attacks
Recently, the importance of including obligations as part of access control systems for
privilege management, for example, in healthcare information systems, has been well …
privilege management, for example, in healthcare information systems, has been well …
[PDF][PDF] Towards an extension of RBAC model
SystemsRole-based access control (RBAC) has been widely used in information systems
including so-called critical systems. Access control models describe the frameworks that …
including so-called critical systems. Access control models describe the frameworks that …
Ts-RBAC: A RBAC model with transformation
G Liu, R Zhang, H Song, C Wang, J Liu, A Liu - Computers & Security, 2016 - Elsevier
The traditional role-based access control (RBAC) model is typically static, ie, permissions
are granted based on a policy that seldom changes. A more flexible support for access …
are granted based on a policy that seldom changes. A more flexible support for access …