Controlling Access to Documents: A Formal Access Control Model
نویسندگان
چکیده
منابع مشابه
CAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملA model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملDeterminants of Credit Access by Small Scale Farmers in Dekina Local Government Area of Kogi State, Nigeria
This study is on the determinants of credit access by small scale farmers in Dekina Local Government Area of Kogi State, Nigeria. The specific objectives are to; identify the major source of credit among the small scale farmers; estimate the determinants of farmers’ access to formal credit; compare the farm income of farmers who have access to formal credit and those who have not and identify c...
متن کاملInternational Journal of Information Security -special Issue on Fast '04 and '05 Manuscript No. Audit-based Compliance Control
In this paper we introduce a new framework for controlling compliance to discretionary access control policies [9,11]. The framework consists of a simple policy language, modeling ownership of data and administrative policies. Users can create documents, and authorize others to process the documents. To control compliance to the document policies, we define a formal audit procedure by which use...
متن کامل