XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...
Due to the sensitive data contained in Data Warehouses (DW), it is essential to specify security measures from the early stages of the DW design and enforce them. Traditional acce...
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
: This paper describes the practical implementation of a federated health record server based on a generic and comprehensive architecture, deployed in a live clinical setting and a...
Dipak Kalra, David Ingram, A. Austin, V. Griffith,...
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...