Galiasso et al., 2000 - Google Patents
Policy mediation for multi-enterprise environmentsGaliasso et al., 2000
- Document ID
- 6067219433370768173
- Author
- Galiasso P
- Bremer O
- Hale J
- Shenoi S
- Ferraiola D
- Hu V
- Publication year
- Publication venue
- Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00)
External Links
Snippet
Existing software infrastructures and middleware provide uniform security services across heterogeneous information networks. However few, if any, tools exist that support access control policy management for and between large enterprise information networks. Insiders …
- 230000003068 static 0 abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ferrari | Access Control in Data Management Systems: A Visual Querying Perspective | |
Ferraiolo et al. | Extensible access control markup language (XACML) and next generation access control (NGAC) | |
Samarati et al. | Access control: Policies, models, and mechanisms | |
De Capitani di Vimercati et al. | Policies, models, and languages for access control | |
Hu et al. | Assessment of access control systems | |
Motta et al. | A contextual role-based access control authorization model for electronic patient record | |
KR101366435B1 (en) | Security authorization queries | |
JP4892179B2 (en) | Zone-based security management for data items | |
US20090205018A1 (en) | Method and system for the specification and enforcement of arbitrary attribute-based access control policies | |
US20230244804A1 (en) | Data management systems and methods | |
Reid et al. | A novel use of RBAC to protect privacy in distributed health care information systems | |
Pernul | Database security | |
Eßmayr et al. | Access controls for federated database environments-taxonomy of design choices | |
Galiasso et al. | Policy mediation for multi-enterprise environments | |
De Capitani di Vimercati et al. | Authorization and access control | |
Sladić et al. | Flexible access control framework for MARC records | |
Hale et al. | Policy Mediation for Multi-Enterprise Environments | |
Rashid et al. | Providing authorization interoperability using rule based HL7 RBAC for CDR (Clinical Data Repository) framework | |
Fernandez et al. | Patterns and pattern diagrams for access control | |
De Capitani Vimercati et al. | New directions in access control | |
Macfie | Semantic role-based access control | |
Smith et al. | Enabling the sharing of neuroimaging data through well-defined intermediate levels of visibility | |
Tall et al. | Access Control in the Era of Big-Data Driven Models and Simulations | |
Chinaei et al. | User-managed access control for health care systems | |
Evered | A formal semantic model for the access specification language RASP |