• No results found

access control policy management

Requirements-based access control analysis and policy specification (RECAPS)

Requirements-based access control analysis and policy specification (RECAPS)

... specifying management and security policies for distributed systems ...requirements-level access control analysis for security policy ...

10

Access control management and privacy-preserving

Access control management and privacy-preserving

... privacy policy in a database ...have control over who is allowed to see their personal data and for what ...preserving access con- trol model. In their access control model, multiple ...

166

11-24-2014 12:00 AM A Collaborative Access Control Model for Shared Items in Online Social Networks

11-24-2014 12:00 AM A Collaborative Access Control Model for Shared Items in Online Social Networks

... collaborative policy for access control and authorization management has become one of the most important and crucial issues in ...limited access control where the privacy ...

153

Access control management and privacy-preserving

Access control management and privacy-preserving

... role-based access control (RBAC) model as RBAC is still the most popular approach towards access control to achieve database security and is available in many ...privacy policy, and ...

15

Multimedia System Security Using Access Control Policy Based on Role Based Access Control

Multimedia System Security Using Access Control Policy Based on Role Based Access Control

... and access strategies for multimedia data types. Content-based data access is important for many multimedia ...data access are still a challenge [12]. Using An Access Control, we can ...

6

Access control management for e-healthcare in cloud
environment

Access control management for e-healthcare in cloud environment

... authorization policy within the scope of whole cloud computing environment sharing common understanding of the structure of information among ...of access control, namely subject domain, object ...

11

Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information

Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information

... security policy class hierarchy was already modeled by the Health Level Seven (HL7) Security Work Group ...security policy point of view, the domain analysis model is highly focusing on access ...

19

Dynamic Access Control For Information Technology Service Management

Dynamic Access Control For Information Technology Service Management

... The management of subject attribute is a major part of an Access Control Mechanism (ACM), and an access control language that will satisfy the demands of interoperability is ...the ...

6

Policy Specification in Role based Access Control on Clouds

Policy Specification in Role based Access Control on Clouds

... User access to resources is controlled by roles; each user is authorized to play certain roles and, based on his own role he can perform accesses to the resources and operate them ...Role-Based Access ...

5

Defining and measuring policy coverage in testing access control policies

Defining and measuring policy coverage in testing access control policies

... of policy testing, we conduct an ex- periment on a set of real policies with mutation testing [9], which is a specific form of fault injection that consists of creating faulty versions of a policy by making ...

10

Assessing quality of policy properties in verification of access control policies

Assessing quality of policy properties in verification of access control policies

... role-based access-control policies into Prolog for verifi- cation ...conduct policy ver- ...existing policy verification approaches because our approach helps assess the quality of the ...

10

Automated Access Control Policy Testing through Code Generation

Automated Access Control Policy Testing through Code Generation

... the policy they are configured to ...the policy which make the network resources vulnerable to security ...in access control policies of enterprises and other ...security policy is also ...

67

134   Oracle Applications System Administrator's Guide   Security [ PUNISHER ] pdf

134 Oracle Applications System Administrator's Guide Security [ PUNISHER ] pdf

... RBAC, access control is defined through roles, and user access to Applications is determined by the roles granted to the ...user. Access control in Oracle Applications closely follows ...

150

Access Control Policy: A Framework to Enforce 
                      Recommendations

Access Control Policy: A Framework to Enforce Recommendations

... the Policy Certification Type document “Authentication Server” issued by the National Security Information Systems[14] stipulates that: “Requirements, common to all levels and specific to a given level, specified ...

12

Access control as a service for the Cloud

Access control as a service for the Cloud

... identity management system that allows identity management delegation to a third trusted party, known as the Identity Provider ...to access a ...OpenID-based access control system, the ...

15

Towards understanding the drivers of policy change: a case study of infection control policies for multi-drug resistant tuberculosis in South Africa

Towards understanding the drivers of policy change: a case study of infection control policies for multi-drug resistant tuberculosis in South Africa

... TB, policy proposals were generated to change the status ...alternative policy frameworks in the wake of the in- creased incidence over the period ...infection control for MDR-TB revolved around in- ...

11

A Survey of Network Slicing in 5G

A Survey of Network Slicing in 5G

... slice Management) - is responsible for designing the network slicing, providing the subnet in a single technical domain, running SLA guarantees, and slicing the ...needs access to which access ...

9

Security and Privacy Issues in Private Cloud Storage

Security and Privacy Issues in Private Cloud Storage

... Based Access Policy: is to ensure that 1) the data owned by a user of one sub-cloud wouldn’t be accessed by any unauthorized users of other sub-clouds in the PSC, and 2) the data owned by one firm in PSC ...

9

A novel queue management policy for delay tolerant networks

A novel queue management policy for delay tolerant networks

... queue management policies that require global ...proposed policy, QM-EBRP, which uses the resulting multi-objective function, opti- mizes the global delivery ratio and delay by prioritizing bundles during ...

23

Integrating access control policy specification into the software development process

Integrating access control policy specification into the software development process

... There are two responses to this concern. First, it is still important to confirm that the ReCAPS group significantly outperformed the control group. For the Hawthorne Effect to be a potential threat to validity, ...

10

Show all 10000 documents...

Related subjects