Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








2,103,308 Hits in 3.6 sec

Role-based User Access Control with Working Status for u-Healthcare System
u-Healthcare 시스템을 위한 RBAC-WS

Bong-Hwan Lee, Hyun-Sug Cho
2010 The KIPS Transactions PartC  
In order to address this problem we propose a user access scheme based on the RBAC (Role Based Access Control) model.  ...  The preceding trust management model for Grid security, FAS(Federation Agent Server), was analyzed and extended to provide supplementary functions for role-based access control in u-Healthcare system.  ...  PACM(Privacy Access Control Model) Patrick C. K Hung은 RBAC을 확장하여 개인의 정보보호 에 향상된 모델인 PACM(Privacy Access Control Model)[15] 을 정의하고 e-Healthcare에 적용하는 방안을 제안하였다.  ... 
doi:10.3745/kipstc.2010.17c.2.173 fatcat:j6ufa6blfrbyll4573lcl7sgky

Influence of Wasting and Underweight on Malaria Status among Ethiopian Children Aged 6-59 Months: A Facility Based Case Control Study

Hamid Yimam Hassen
2015 General Medicine Open Access  
This study has addressed the contributory effect of wasting and underweight on malaria status of children Methodology: An unmatched case control study was employed to assess the influence of wasting and  ...  Children with confirmed malaria were enrolled as cases and for every confirmed malaria case; three controls that visited the facility for fever other than malaria were interviewed based on their order  ...  Citation: Hassen HY, Ali JH (2015) Influence of Wasting and Underweight on Malaria Status among Ethiopian Children Aged 6-59 Months: A Facility Based Case Control Study.  ... 
doi:10.4172/2327-5146.1000190 fatcat:iah7drmhz5ezvj2bc2nl2w44xi

Development of Patient Status-Based Dynamic Access System for Medical Information Systems

Chang Jeong, Vathana Ban, Kwon Yoon, Su Joo
2015 Symmetry  
We can define usefulness as the dynamic access application service based on the final result of the proposed system.  ...  control method.  ...  Patient Status-Based Dynamic Access Control System This section describes the total environment and the dynamic access method of the proposed patient status-based dynamic access control system as well  ... 
doi:10.3390/sym7021028 fatcat:rkefrxnb3zgj3f5exvxqhwhat4

Location-based Access Control in Neighborhood Geosocial Network: a Case of Emergency Assistance

2020 International journal of recent technology and engineering  
The objective of this paper is two-fold: First, to propose an access control using density-based and position-based location conditions for neighborhood geosocial network.  ...  Second, to design mySOS, a proof-of-concept prototype that incorporate the proposed access control to improve access control for emergency assistance in neighborhood geosocial network.  ...  IMPLEMENTATION OF ACCESS CONTROL This section demonstrates the implementation of the proposed location-based access control in both emergency post and neighbor SOS functions for different resident status  ... 
doi:10.35940/ijrte.d7019.018520 fatcat:gyhz7pppgfcynpsdulfxtwuv2a

TRUST- BASED MODELING MAC-TYPE ACCESS CONTROL THROUGH ACCESS AND ACTIONS CONTROL POLICIES

Marcel Danilescu, Technical University of Moldova, Victor Besliu, Technical University of Moldova
2021 Journal of Engineering Science (Chişinău)  
Among the access control modeling solutions developed are Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC), presented in the U.S.A. by the National Institute of Standard and Technology  ...  In Romania, in 2010, the access control solution based on trust was presented.  ...  Introduction For starters, we will do a trust-based presentation of access and action control.  ... 
doi:10.52326/jes.utm.2021.28(2).05 fatcat:mbykhyddsrd3di6mylrcoxt44q

Architectural issues for a location-aware role-based access control system

Maria Luisa Damiani, Elisa Bertino
2006 Proceedings of the 2006 ACM symposium on Applied computing - SAC '06  
To address these requirements a general architectural framework for an access control system based on location-aware roles is introduced.  ...  E-LBS pose challenging requirements, including the need of selective access to the services based on the position of mobile users and spatially-bounded organizational functions.  ...  To deal with these requirements and regulate the access to services based on user position, an access control system based on the RBAC (Role Based Access Control) model seems a natural choice, also because  ... 
doi:10.1145/1141277.1141558 dblp:conf/sac/DamianiB06 fatcat:bg2x2sifrvge5a4r6td5uu2n6m

CBDAC: Context-Based Dynamic Access Control Model Using Intuitive 5W1H for Ubiquitous Sensor Network

Jiseong Son, Jeong-Dong Kim, Hong-Seok Na, Doo-Kwon Baik
2015 International Journal of Distributed Sensor Networks  
A key feature of this approach is dynamic access control. Therefore, we propose a model for privacy preservation that is context-based dynamic access control that uses intuitive 5W1H for USN.  ...  According to this model, the access control strategy can be determined dynamically based on context elements and subject attributes, in addition to objects and operations, using access control entities  ...  Role-based access control (RBAC) [12] [13] [14] is the most representative access control model.  ... 
doi:10.1155/2015/836546 fatcat:7xvocj36e5hqno2t4ntcmihd5q

Network Access Control for Location-Based Mobile Services in Heterogeneous Wireless Networks

Dae-Young Kim, Dae-sik Ko, Seokhoon Kim
2017 Mobile Information Systems  
That is, quality of services of the location-based video stream is determined by the network access control.  ...  The proposed method estimates the network status with Naïve Bayesian Classifier and performs network access control according to the estimated network status.  ...  The proposed method is compared with the buffer-based network access control and no network access control.  ... 
doi:10.1155/2017/6195024 fatcat:3nhybpffajbc7jd57oycseokrm

SCIMS: A Social Context Information Management System for Socially-Aware Applications [chapter]

Muhammad Ashad Kabir, Jun Han, Jian Yu, Alan Colman
2012 Lecture Notes in Computer Science  
and status; an ontology based policy model and language for owners to control access to their information; a query interface for accessing and utilizing social context information.  ...  It includes the ability to acquire raw social data from multiple sources; an ontology based model for classifying, inferring and storing social context information, in particular, social relationships  ...  based access control.  ... 
doi:10.1007/978-3-642-31095-9_20 fatcat:ycumqvohqjbjvhq45if5sejmqi

An Improved Access Control Model for the CSCD Environment [chapter]

Ai Fei, zhang Ping
2014 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
passive access control.  ...  For the Computer Supported Collaborative Design (CSCD) environment's groups, dynamics and distribution characteristics, the paper proposes a Task & Role-Based access control model (T & RBAC) and makes  ...  The main ones include the Discretionary access control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), and Task-Role-based access control (T-RBAC).  ... 
doi:10.1007/978-3-319-13326-3_46 fatcat:hhv2xbqg6rf47jlzp44zhq7zui

Enforcing Context-Sensitive Policies in Collaborative Business Environments

Alberto Sardinha, Jinghai Rao, Norman Sadeh
2007 2007 IEEE 23rd International Conference on Data Engineering Workshop  
We propose an architecture for enforcing contextsensitive access control policies in which sources of information can be annotated with rich semantic profiles.  ...  This includes a meta-control architecture for dynamically orchestrating policy reasoning together with the identification and access of external sources of information required to enforce policies.  ...  under ITR grant 0205435 ("Multiattribute Negotiation in Dynamic Supply Chains"), including a supplement to collaborate with the EU IST TrustCom project, and under Cyber Trust Grant CNS-0627513 ("User-Controllable  ... 
doi:10.1109/icdew.2007.4401058 dblp:conf/icde/SardinhaRS07 fatcat:rnxizjh655eiznflxmbw6s5kcq

A meta-control architecture for orchestrating policy enforcement across heterogeneous information sources

Jinghai Rao, Alberto Sardinha, Norman Sadeh
2009 Journal of Web Semantics  
Policy Enforcing Agents rely on meta-control strategies to dynamically interleave semantic web reasoning and service discovery and access.  ...  This article introduces a semantic web framework and a meta-control model to orchestrate policy reasoning with the identification and access of relevant sources of information.  ...  Supports have also been provided under the Cyber Trust Grant CNS-0627513 ("User-Controllable Security and Privacy for Pervasive Computing") and by ARO under research grant DAAD19-02-1-0389 ("Perpetually  ... 
doi:10.1016/j.websem.2007.10.001 fatcat:vwmoeeoqjnemtbhv3ccik3ewta

A Meta-Control Architecture for Orchestrating Policy Enforcement Across Heterogeneous Information Sources

Jinghai Rao, Alberto Sardinha, Norman Sadeh
2009 Social Science Research Network  
Policy Enforcing Agents rely on meta-control strategies to dynamically interleave semantic web reasoning and service discovery and access.  ...  This article introduces a semantic web framework and a meta-control model to orchestrate policy reasoning with the identification and access of relevant sources of information.  ...  Supports have also been provided under the Cyber Trust Grant CNS-0627513 ("User-Controllable Security and Privacy for Pervasive Computing") and by ARO under research grant DAAD19-02-1-0389 ("Perpetually  ... 
doi:10.2139/ssrn.3199438 fatcat:mmudnzsbtrdunevo4pzaaf4bqi

E-Store Management Using Bell-LaPadula Access Control Security Model

Saida Nafisah Roslan, Isredza Rahmi A Hamid, Palaniappan Shamala
2018 JOIV: International Journal on Informatics Visualization  
The user access right has been assigned based on their access level.  ...  Generally, the existing store management system does not provide any access control mechanism in order to manage resources.  ...  According to the Bell-LaPadula access control model [1] , each user has its own task and role based on the security level.  ... 
doi:10.30630/joiv.2.3-2.140 fatcat:icg4ueoxp5cfheh56wcoaeajbi

Secure Data Verification and Virtual Machine Monitoring

P. V. Samuel Blessed Nayagam, A. Shajin Nargunam
2018 International Journal of Engineering & Technology  
The proposed access control show ensures virtual machines by receiving access control at various layers.  ...  The process access control is categorized based on three following factors: i. Identity based access control list ii. Process role based access control list iii.  ...  Temporal based access control list Three types of access control list are maintained in the virtualized environment.  ... 
doi:10.14419/ijet.v7i4.36.24140 fatcat:yvly5kqpg5fdhhvonervfki254
« Previous Showing results 1 — 15 out of 2,103,308 results