A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Role-based User Access Control with Working Status for u-Healthcare System
u-Healthcare 시스템을 위한 RBAC-WS
2010
The KIPS Transactions PartC
u-Healthcare 시스템을 위한 RBAC-WS
In order to address this problem we propose a user access scheme based on the RBAC (Role Based Access Control) model. ...
The preceding trust management model for Grid security, FAS(Federation Agent Server), was analyzed and extended to provide supplementary functions for role-based access control in u-Healthcare system. ...
PACM(Privacy Access Control Model)
Patrick C. K Hung은 RBAC을 확장하여 개인의 정보보호
에 향상된 모델인 PACM(Privacy Access Control Model)[15]
을 정의하고 e-Healthcare에 적용하는 방안을 제안하였다. ...
doi:10.3745/kipstc.2010.17c.2.173
fatcat:j6ufa6blfrbyll4573lcl7sgky
Influence of Wasting and Underweight on Malaria Status among Ethiopian Children Aged 6-59 Months: A Facility Based Case Control Study
2015
General Medicine Open Access
This study has addressed the contributory effect of wasting and underweight on malaria status of children Methodology: An unmatched case control study was employed to assess the influence of wasting and ...
Children with confirmed malaria were enrolled as cases and for every confirmed malaria case; three controls that visited the facility for fever other than malaria were interviewed based on their order ...
Citation: Hassen HY, Ali JH (2015) Influence of Wasting and Underweight on Malaria Status among Ethiopian Children Aged 6-59 Months: A Facility Based Case Control Study. ...
doi:10.4172/2327-5146.1000190
fatcat:iah7drmhz5ezvj2bc2nl2w44xi
Development of Patient Status-Based Dynamic Access System for Medical Information Systems
2015
Symmetry
We can define usefulness as the dynamic access application service based on the final result of the proposed system. ...
control method. ...
Patient Status-Based Dynamic Access Control System This section describes the total environment and the dynamic access method of the proposed patient status-based dynamic access control system as well ...
doi:10.3390/sym7021028
fatcat:rkefrxnb3zgj3f5exvxqhwhat4
Location-based Access Control in Neighborhood Geosocial Network: a Case of Emergency Assistance
2020
International journal of recent technology and engineering
The objective of this paper is two-fold: First, to propose an access control using density-based and position-based location conditions for neighborhood geosocial network. ...
Second, to design mySOS, a proof-of-concept prototype that incorporate the proposed access control to improve access control for emergency assistance in neighborhood geosocial network. ...
IMPLEMENTATION OF ACCESS CONTROL This section demonstrates the implementation of the proposed location-based access control in both emergency post and neighbor SOS functions for different resident status ...
doi:10.35940/ijrte.d7019.018520
fatcat:gyhz7pppgfcynpsdulfxtwuv2a
TRUST- BASED MODELING MAC-TYPE ACCESS CONTROL THROUGH ACCESS AND ACTIONS CONTROL POLICIES
2021
Journal of Engineering Science (Chişinău)
Among the access control modeling solutions developed are Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC), presented in the U.S.A. by the National Institute of Standard and Technology ...
In Romania, in 2010, the access control solution based on trust was presented. ...
Introduction For starters, we will do a trust-based presentation of access and action control. ...
doi:10.52326/jes.utm.2021.28(2).05
fatcat:mbykhyddsrd3di6mylrcoxt44q
Architectural issues for a location-aware role-based access control system
2006
Proceedings of the 2006 ACM symposium on Applied computing - SAC '06
To address these requirements a general architectural framework for an access control system based on location-aware roles is introduced. ...
E-LBS pose challenging requirements, including the need of selective access to the services based on the position of mobile users and spatially-bounded organizational functions. ...
To deal with these requirements and regulate the access to services based on user position, an access control system based on the RBAC (Role Based Access Control) model seems a natural choice, also because ...
doi:10.1145/1141277.1141558
dblp:conf/sac/DamianiB06
fatcat:bg2x2sifrvge5a4r6td5uu2n6m
CBDAC: Context-Based Dynamic Access Control Model Using Intuitive 5W1H for Ubiquitous Sensor Network
2015
International Journal of Distributed Sensor Networks
A key feature of this approach is dynamic access control. Therefore, we propose a model for privacy preservation that is context-based dynamic access control that uses intuitive 5W1H for USN. ...
According to this model, the access control strategy can be determined dynamically based on context elements and subject attributes, in addition to objects and operations, using access control entities ...
Role-based access control (RBAC) [12] [13] [14] is the most representative access control model. ...
doi:10.1155/2015/836546
fatcat:7xvocj36e5hqno2t4ntcmihd5q
Network Access Control for Location-Based Mobile Services in Heterogeneous Wireless Networks
2017
Mobile Information Systems
That is, quality of services of the location-based video stream is determined by the network access control. ...
The proposed method estimates the network status with Naïve Bayesian Classifier and performs network access control according to the estimated network status. ...
The proposed method is compared with the buffer-based network access control and no network access control. ...
doi:10.1155/2017/6195024
fatcat:3nhybpffajbc7jd57oycseokrm
SCIMS: A Social Context Information Management System for Socially-Aware Applications
[chapter]
2012
Lecture Notes in Computer Science
and status; an ontology based policy model and language for owners to control access to their information; a query interface for accessing and utilizing social context information. ...
It includes the ability to acquire raw social data from multiple sources; an ontology based model for classifying, inferring and storing social context information, in particular, social relationships ...
based access control. ...
doi:10.1007/978-3-642-31095-9_20
fatcat:ycumqvohqjbjvhq45if5sejmqi
An Improved Access Control Model for the CSCD Environment
[chapter]
2014
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
passive access control. ...
For the Computer Supported Collaborative Design (CSCD) environment's groups, dynamics and distribution characteristics, the paper proposes a Task & Role-Based access control model (T & RBAC) and makes ...
The main ones include the Discretionary access control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), and Task-Role-based access control (T-RBAC). ...
doi:10.1007/978-3-319-13326-3_46
fatcat:hhv2xbqg6rf47jlzp44zhq7zui
Enforcing Context-Sensitive Policies in Collaborative Business Environments
2007
2007 IEEE 23rd International Conference on Data Engineering Workshop
We propose an architecture for enforcing contextsensitive access control policies in which sources of information can be annotated with rich semantic profiles. ...
This includes a meta-control architecture for dynamically orchestrating policy reasoning together with the identification and access of external sources of information required to enforce policies. ...
under ITR grant 0205435 ("Multiattribute Negotiation in Dynamic Supply Chains"), including a supplement to collaborate with the EU IST TrustCom project, and under Cyber Trust Grant CNS-0627513 ("User-Controllable ...
doi:10.1109/icdew.2007.4401058
dblp:conf/icde/SardinhaRS07
fatcat:rnxizjh655eiznflxmbw6s5kcq
A meta-control architecture for orchestrating policy enforcement across heterogeneous information sources
2009
Journal of Web Semantics
Policy Enforcing Agents rely on meta-control strategies to dynamically interleave semantic web reasoning and service discovery and access. ...
This article introduces a semantic web framework and a meta-control model to orchestrate policy reasoning with the identification and access of relevant sources of information. ...
Supports have also been provided under the Cyber Trust Grant CNS-0627513 ("User-Controllable Security and Privacy for Pervasive Computing") and by ARO under research grant DAAD19-02-1-0389 ("Perpetually ...
doi:10.1016/j.websem.2007.10.001
fatcat:vwmoeeoqjnemtbhv3ccik3ewta
A Meta-Control Architecture for Orchestrating Policy Enforcement Across Heterogeneous Information Sources
2009
Social Science Research Network
Policy Enforcing Agents rely on meta-control strategies to dynamically interleave semantic web reasoning and service discovery and access. ...
This article introduces a semantic web framework and a meta-control model to orchestrate policy reasoning with the identification and access of relevant sources of information. ...
Supports have also been provided under the Cyber Trust Grant CNS-0627513 ("User-Controllable Security and Privacy for Pervasive Computing") and by ARO under research grant DAAD19-02-1-0389 ("Perpetually ...
doi:10.2139/ssrn.3199438
fatcat:mmudnzsbtrdunevo4pzaaf4bqi
E-Store Management Using Bell-LaPadula Access Control Security Model
2018
JOIV: International Journal on Informatics Visualization
The user access right has been assigned based on their access level. ...
Generally, the existing store management system does not provide any access control mechanism in order to manage resources. ...
According to the Bell-LaPadula access control model [1] , each user has its own task and role based on the security level. ...
doi:10.30630/joiv.2.3-2.140
fatcat:icg4ueoxp5cfheh56wcoaeajbi
Secure Data Verification and Virtual Machine Monitoring
2018
International Journal of Engineering & Technology
The proposed access control show ensures virtual machines by receiving access control at various layers. ...
The process access control is categorized based on three following factors: i. Identity based access control list ii. Process role based access control list iii. ...
Temporal based access control list Three types of access control list are maintained in the virtualized environment. ...
doi:10.14419/ijet.v7i4.36.24140
fatcat:yvly5kqpg5fdhhvonervfki254
« Previous
Showing results 1 — 15 out of 2,103,308 results