A trust-based context-aware access control model for web-services
R Bhatti, E Bertino, A Ghafoor - Distributed and Parallel Databases, 2005 - Springer
A key challenge in Web services security is the design of effective access control schemes
that can adequately meet the unique security challenges posed by the Web services …
that can adequately meet the unique security challenges posed by the Web services …
Customization restrictions for multi-layer XML customization
CD Lowes - US Patent 8,875,306, 2014 - Google Patents
Embodiments of the present invention provide techniques for customizing aspects of a
metadata-driven software application. In particular, embodiments of the present invention …
metadata-driven software application. In particular, embodiments of the present invention …
A purpose based usage access control model
L Sun, H Wang - International Journal of Computer and …, 2010 - research.usq.edu.au
As privacy becomes a major concern for consumers and enterprises, many research have
been focused on the privacy protecting technology in recent years. In this paper, we present …
been focused on the privacy protecting technology in recent years. In this paper, we present …
[PDF][PDF] SecFHIR: a security specification model for fast healthcare interoperability resources
AM Altamimi - International Journal of Advanced …, 2016 - pdfs.semanticscholar.org
Patients taking medical treatment in distinct healthcare institutions have their information
deeply fragmented between very different locations. All this information---probably with …
deeply fragmented between very different locations. All this information---probably with …
Towards secure xml document with usage control
XML promoted by the World Wide Web Consortium (W3C) is a de facto standard language
for document representation and exchange on the Internet. XML documents may contain …
for document representation and exchange on the Internet. XML documents may contain …
A practical mandatory access control model for XML databases
A practical mandatory access control (MAC) model for XML databases is presented in this
paper. The label type and label access policy can be defined according to the requirements …
paper. The label type and label access policy can be defined according to the requirements …
A purpose‐based access control in native XML databases
L Sun, H Wang - Concurrency and Computation: Practice and …, 2012 - Wiley Online Library
With the growing importance of privacy in data access, much research has been done on the
privacy protecting technology in the recent years. Developing an access control model and …
privacy protecting technology in the recent years. Developing an access control model and …
Secure information sharing in a virtual multi-agency team environment
This paper proposes a two tier RBAC approach for secure and selective information sharing
among virtual multi-agency response team (VMART) and allows expansion of the VMART by …
among virtual multi-agency response team (VMART) and allows expansion of the VMART by …