Results 321 to 330 of about 7,761,143 (347)
Some of the next articles are maybe not open access.

Access control by action control

Proceedings of the 13th ACM symposium on Access control models and technologies, 2008
We address the problem of defining access control policies that may be used in the evaluation of requests made by client actors, in the course of e-trading, to perform actions on the resources maintained by an e-collective. An e-collective is a group of agents that may act individually or in conjunction with other agents to satisfy a client's request ...
openaire   +1 more source

Personalizing access control by generalizing access control

Proceedings of the 15th ACM symposium on Access control models and technologies, 2010
We address the problem of providing data subjects with self-selected controls on access to their personal information. Existing approaches for this are not always sufficient in terms of offering the degrees of control and scope for individualization of access policies that are needed for personal data protection (and usage).
openaire   +3 more sources

Access and Access Controls

2019
Evolution of healthcare systems and the constantly changing regulatory landscape continuously alter all facets of health information technology including access. Access to information systems must be controlled in order to protect privacy and confidentiality.
Karl E. Misulis, Mark E. Frisse
openaire   +1 more source

Access control

2007
Presentazione delle caratteristiche principali delle tecnologie per il controllo dell’accesso.
S. De Capitani di Vimercati   +3 more
openaire   +3 more sources

Access Controls

2013
Application of security policies for computers and their systems and procedures leads into the mechanism of access control. The fundamental goal of any access control instrument is to provide a verifiable system for assuring the protection of information from unauthorized or inappropriate access, as outlined in one or more security policies. Generally,
openaire   +4 more sources

Access Control and Authorization

2008
One of the system administrator’s biggest problems, which can soon turn into a nightmare if it is not well handled, is controlling access of who gets in and what is taken out of the system and who uses what resources, when, and in what amounts. Access control is restricting this access to a system or system resources based on something other than the ...
openaire   +2 more sources

Authorization and Access Control

2007
Access control is the process of controlling every request to a system and determining, based on specified rules (authorizations), whether the request should be granted or denied. The definition of an access control system is typically based on three concepts: access control policies, access control models, and access control mechanisms.
S. De Capitani di Vimercati   +2 more
openaire   +3 more sources

XML Access Control

2009
Definition XML access control refers to the practice of limiting access to (parts of) XML data to only authorized users. Similar to access control over other types of data and resources, XML access control is centered around two key problems: (i) the development of formal models for the specification of access control policies over XML data; and (ii ...
Dongwon Lee, Ting Yu
openaire   +2 more sources

A Logic of Access Control

The Computer Journal, 2001
The effectiveness of an access control mechanism in implementing a security policy in a centralized operating system is often weakened because of the large number of possible access rights involved, informal specification of security policy and a lack of tools for assisting systems administrators.
Jason Crampton   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy