Policy reconciliation for access control in dynamic cross-enterprise collaborations
نویسندگان
چکیده
منابع مشابه
Privacy Preserving Dynamic Access Control Model with Access Delegation for eHealth
eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...
متن کاملAccess and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملA Distributed Access Control Framework For XML Document Centric Collaborations
Collaboratively working on documents within a distributed context is a non-trivial task, in particular if neither a centralized access control policy enforcement platform nor a centralized document repository can be assumed to be present. Decoupling the specification of the access control policy of documents from its later autonomous enforcement can make it easier to edit documents in a decentr...
متن کاملUDDI Access Control for the Extended Enterprise
An Extended Enterprise is comprised of not only the enterprise itself but also the enterprise's suppliers, clients and other associated organizations. The Extended Enterprise, in response to business needs and decisions, can dynamically alter these interrelationships, for example possibly swapping out some partners and swapping in others. Web services are an appropriate technology choice to fac...
متن کاملPath-Based Access Control for Enterprise Networks
Enterprise networks are ubiquitious and increasingly complex. The mechanisms for defining security policies in these networks have not kept up with the advancements in networking technology. In most cases, system administrators define policies on a per-application basis, and subsequently, these policies do not interact. For example, there is no mechanism that allows a web server to communicate ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Enterprise Information Systems
سال: 2017
ISSN: 1751-7575,1751-7583
DOI: 10.1080/17517575.2017.1355985