Sciweavers

223 search results - page 16 / 45
» Relationship-based access control: protection model and poli...
Sort
View
CSFW
2006
IEEE
14 years 1 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
DBSEC
2009
130views Database» more  DBSEC 2009»
13 years 8 months ago
Implementing Reflective Access Control in SQL
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege in an access control ...
Lars E. Olson, Carl A. Gunter, William R. Cook, Ma...
ACSAC
2003
IEEE
14 years 25 days ago
A Policy Validation Framework for Enterprise Authorization Specification
The validation of enterprise authorization specification for conformance to enterprise security policies requires an out-of-band framework in many situations since the enforcing a...
Ramaswamy Chandramouli
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
13 years 11 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
COMPSEC
2008
116views more  COMPSEC 2008»
13 years 7 months ago
Enforcing memory policy specifications in reconfigurable hardware
While general-purpose processor based systems are built to enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reco...
Ted Huffmire, Timothy Sherwood, Ryan Kastner, Timo...