Sciweavers

438 search results - page 13 / 88
» Activity-based Access Control Model to Hospital Information
Sort
View
CIKM
2005
Springer
14 years 28 days ago
The case for access control on XML relationships
With the emergence of XML as the de facto standard to exchange and disseminate information, the problem of regulating access to XML documents has attracted a considerable attentio...
Béatrice Finance, Saïda Medjdoub, Phil...
JCS
2008
119views more  JCS 2008»
13 years 7 months ago
Synthesising verified access control systems through model checking
We present a framework for evaluating and generating access control policies. The framework contains a modelling formalism called RW, which is supported by a model checking tool. ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
JMS
2010
109views more  JMS 2010»
13 years 2 months ago
Newborn Screening Healthcare Information System Based on Service-Oriented Architecture
In this paper, we established a newborn screening system under the HL7/Web Services frameworks. We rebuilt the NTUH Newborn Screening Laboratory's original standalone architec...
Sung-huai Hsieh, Sheau-Ling Hsieh, Yin-Hsiu Chien,...
ISW
2010
Springer
13 years 5 months ago
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents
We analyze the Extended Access Control (EAC) protocol for authenticated key agreement, recently proposed by the German Federal Office for Information Security (BSI) for the deploym...
Özgür Dagdelen, Marc Fischlin
CCS
2008
ACM
13 years 9 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton