Sciweavers

3605 search results - page 199 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
ACISP
2003
Springer
15 years 10 months ago
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems
Abstract. This paper examines the access control requirements of distributed health care information networks. Since the electronic sharing of an individual’s personal health inf...
Jason Reid, Ian Cheong, Matthew Henricksen, Jason ...
DAC
2002
ACM
16 years 5 months ago
System design methodologies for a wireless security processing platform
Srivaths Ravi, Anand Raghunathan, Nachiketh R. Pot...
GRID
2007
Springer
15 years 4 months ago
Managing Role-Based Access Control Policies for Grid Databases in OGSA-DAI Using CAS
In this paper, we present a role-based access control method for accessing databases through the Open Grid Services Architecture – Data Access and Integration (OGSA-DAI) framewor...
Anil L. Pereira, Vineela Muppavarapu, Soon M. Chun...
EDOC
2006
IEEE
15 years 10 months ago
Information Security Guidance for Enterprise Transformation
John A. Anderson, Vijaykumar Rachamadugu
ISSTA
2006
ACM
15 years 10 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...