Abstract. This paper examines the access control requirements of distributed health care information networks. Since the electronic sharing of an individual’s personal health inf...
Jason Reid, Ian Cheong, Matthew Henricksen, Jason ...
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
Coordination and access control are related issues in open distributed agent systems, being both concerned with governing interaction between agents and resources. In particular, w...
Marco Cremonini, Andrea Omicini, Franco Zambonelli
The definition and management of access rules (e.g., to control the access to business documents and business functions) is an important task within any enterprise information sy...