Sciweavers

116 search results - page 21 / 24
» Secure Role-Based Workflow Models
Sort
View
ACISP
2003
Springer
14 years 3 months ago
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems
Abstract. This paper examines the access control requirements of distributed health care information networks. Since the electronic sharing of an individual’s personal health inf...
Jason Reid, Ian Cheong, Matthew Henricksen, Jason ...
ACSAC
2002
IEEE
14 years 2 months ago
A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC Standard
In this paper we describe a mainframe access control system (DENT) and its associated delegated administration tool (DSAS) that were used in a financial institution for over 20 y...
Andrew D. Marshall
SACMAT
2009
ACM
14 years 4 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
SKG
2006
IEEE
14 years 3 months ago
A Semantic-based Meteorology Grid Service Registry, Discovery and Composition Framework
Meteorology Grid Computing aims to provide scientist with seamless, reliable, secure and inexpensive access to meteorological resources. In this paper, we presented a semantic-bas...
Kaijun Ren, Nong Xiao, Junqiang Song, Weimin Zhang...
CAD
2000
Springer
13 years 9 months ago
Lessons learned developing protocols for the industrial virtual enterprise
The protocols selected and developed by the NIIIP Consortium have been validated in three end-of-cycle demonstrations. In each cycle, a team with expertise in technical product da...
Martin Hardwick, K. C. Morris, David L. Spooner, T...