Results 321 to 330 of about 7,761,143 (347)
Some of the next articles are maybe not open access.
Access control by action control
Proceedings of the 13th ACM symposium on Access control models and technologies, 2008We address the problem of defining access control policies that may be used in the evaluation of requests made by client actors, in the course of e-trading, to perform actions on the resources maintained by an e-collective. An e-collective is a group of agents that may act individually or in conjunction with other agents to satisfy a client's request ...
openaire +1 more source
Personalizing access control by generalizing access control
Proceedings of the 15th ACM symposium on Access control models and technologies, 2010We address the problem of providing data subjects with self-selected controls on access to their personal information. Existing approaches for this are not always sufficient in terms of offering the degrees of control and scope for individualization of access policies that are needed for personal data protection (and usage).
openaire +3 more sources
2019
Evolution of healthcare systems and the constantly changing regulatory landscape continuously alter all facets of health information technology including access. Access to information systems must be controlled in order to protect privacy and confidentiality.
Karl E. Misulis, Mark E. Frisse
openaire +1 more source
Evolution of healthcare systems and the constantly changing regulatory landscape continuously alter all facets of health information technology including access. Access to information systems must be controlled in order to protect privacy and confidentiality.
Karl E. Misulis, Mark E. Frisse
openaire +1 more source
2007
Presentazione delle caratteristiche principali delle tecnologie per il controllo dell’accesso.
S. De Capitani di Vimercati+3 more
openaire +3 more sources
Presentazione delle caratteristiche principali delle tecnologie per il controllo dell’accesso.
S. De Capitani di Vimercati+3 more
openaire +3 more sources
2013
Application of security policies for computers and their systems and procedures leads into the mechanism of access control. The fundamental goal of any access control instrument is to provide a verifiable system for assuring the protection of information from unauthorized or inappropriate access, as outlined in one or more security policies. Generally,
openaire +4 more sources
Application of security policies for computers and their systems and procedures leads into the mechanism of access control. The fundamental goal of any access control instrument is to provide a verifiable system for assuring the protection of information from unauthorized or inappropriate access, as outlined in one or more security policies. Generally,
openaire +4 more sources
Access Control and Authorization
2008One of the system administrator’s biggest problems, which can soon turn into a nightmare if it is not well handled, is controlling access of who gets in and what is taken out of the system and who uses what resources, when, and in what amounts. Access control is restricting this access to a system or system resources based on something other than the ...
openaire +2 more sources
Authorization and Access Control
2007Access control is the process of controlling every request to a system and determining, based on specified rules (authorizations), whether the request should be granted or denied. The definition of an access control system is typically based on three concepts: access control policies, access control models, and access control mechanisms.
S. De Capitani di Vimercati+2 more
openaire +3 more sources
2009
Definition XML access control refers to the practice of limiting access to (parts of) XML data to only authorized users. Similar to access control over other types of data and resources, XML access control is centered around two key problems: (i) the development of formal models for the specification of access control policies over XML data; and (ii ...
Dongwon Lee, Ting Yu
openaire +2 more sources
Definition XML access control refers to the practice of limiting access to (parts of) XML data to only authorized users. Similar to access control over other types of data and resources, XML access control is centered around two key problems: (i) the development of formal models for the specification of access control policies over XML data; and (ii ...
Dongwon Lee, Ting Yu
openaire +2 more sources
The Computer Journal, 2001
The effectiveness of an access control mechanism in implementing a security policy in a centralized operating system is often weakened because of the large number of possible access rights involved, informal specification of security policy and a lack of tools for assisting systems administrators.
Jason Crampton+2 more
openaire +2 more sources
The effectiveness of an access control mechanism in implementing a security policy in a centralized operating system is often weakened because of the large number of possible access rights involved, informal specification of security policy and a lack of tools for assisting systems administrators.
Jason Crampton+2 more
openaire +2 more sources