[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Galiasso et al., 2000 - Google Patents

Policy mediation for multi-enterprise environments

Galiasso et al., 2000

Document ID
6067219433370768173
Author
Galiasso P
Bremer O
Hale J
Shenoi S
Ferraiola D
Hu V
Publication year
Publication venue
Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00)

External Links

Snippet

Existing software infrastructures and middleware provide uniform security services across heterogeneous information networks. However few, if any, tools exist that support access control policy management for and between large enterprise information networks. Insiders …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application

Similar Documents

Publication Publication Date Title
Ferrari Access Control in Data Management Systems: A Visual Querying Perspective
Ferraiolo et al. Extensible access control markup language (XACML) and next generation access control (NGAC)
Samarati et al. Access control: Policies, models, and mechanisms
De Capitani di Vimercati et al. Policies, models, and languages for access control
Hu et al. Assessment of access control systems
Motta et al. A contextual role-based access control authorization model for electronic patient record
KR101366435B1 (en) Security authorization queries
JP4892179B2 (en) Zone-based security management for data items
US20090205018A1 (en) Method and system for the specification and enforcement of arbitrary attribute-based access control policies
US20230244804A1 (en) Data management systems and methods
Reid et al. A novel use of RBAC to protect privacy in distributed health care information systems
Pernul Database security
Eßmayr et al. Access controls for federated database environments-taxonomy of design choices
Galiasso et al. Policy mediation for multi-enterprise environments
De Capitani di Vimercati et al. Authorization and access control
Sladić et al. Flexible access control framework for MARC records
Hale et al. Policy Mediation for Multi-Enterprise Environments
Rashid et al. Providing authorization interoperability using rule based HL7 RBAC for CDR (Clinical Data Repository) framework
Fernandez et al. Patterns and pattern diagrams for access control
De Capitani Vimercati et al. New directions in access control
Macfie Semantic role-based access control
Smith et al. Enabling the sharing of neuroimaging data through well-defined intermediate levels of visibility
Tall et al. Access Control in the Era of Big-Data Driven Models and Simulations
Chinaei et al. User-managed access control for health care systems
Evered A formal semantic model for the access specification language RASP