A trust-based context-aware access control model for web-services

R Bhatti, E Bertino, A Ghafoor - Distributed and Parallel Databases, 2005 - Springer
A key challenge in Web services security is the design of effective access control schemes
that can adequately meet the unique security challenges posed by the Web services …

Customization restrictions for multi-layer XML customization

CD Lowes - US Patent 8,875,306, 2014 - Google Patents
Embodiments of the present invention provide techniques for customizing aspects of a
metadata-driven software application. In particular, embodiments of the present invention …

A purpose based usage access control model

L Sun, H Wang - International Journal of Computer and …, 2010 - research.usq.edu.au
As privacy becomes a major concern for consumers and enterprises, many research have
been focused on the privacy protecting technology in recent years. In this paper, we present …

[PDF][PDF] SecFHIR: a security specification model for fast healthcare interoperability resources

AM Altamimi - International Journal of Advanced …, 2016 - pdfs.semanticscholar.org
Patients taking medical treatment in distinct healthcare institutions have their information
deeply fragmented between very different locations. All this information---probably with …

Towards secure xml document with usage control

J Cao, L Sun, H Wang - … Research and Development-APWeb 2005: 7th …, 2005 - Springer
XML promoted by the World Wide Web Consortium (W3C) is a de facto standard language
for document representation and exchange on the Internet. XML documents may contain …

A practical mandatory access control model for XML databases

H Zhu, K Lü, R Jin - Information Sciences, 2009 - Elsevier
A practical mandatory access control (MAC) model for XML databases is presented in this
paper. The label type and label access policy can be defined according to the requirements …

A purpose‐based access control in native XML databases

L Sun, H Wang - Concurrency and Computation: Practice and …, 2012 - Wiley Online Library
With the growing importance of privacy in data access, much research has been done on the
privacy protecting technology in the recent years. Developing an access control model and …

Secure information sharing in a virtual multi-agency team environment

N Adam, A Kozanoglu, A Paliwal, B Shafiq - Electronic Notes in Theoretical …, 2007 - Elsevier
This paper proposes a two tier RBAC approach for secure and selective information sharing
among virtual multi-agency response team (VMART) and allows expansion of the VMART by …

[引用][C] 面向XML 文档的细粒度强制访问控制模型

李斓, 何永忠, 冯登国 - 软件学报, 2004

[引用][C] 基于XACML 和RBAC 的访问控制系统

高扬, 张家钰, 吴敏 - 计算机应用与软件, 2006