نتایج جستجو برای: access control policy acp

تعداد نتایج: 1825945  

Introduction: Nowadays, several casein components such as casein phosphopeptide amorphous calcium phosphate (CPP-ACP) are vastly considered as a suitable replacement for fluoride component . The aim of this study was to compare the effect of CPP-ACP paste and fluoride varnish on dentin hypersensitivity reduction. Materials & Methods: In this clinical trial study, thirty adult patients betwee...

2011
Meghdad Mirabi Hamidah Ibrahim Leila Fathi Nur Izura Udzir Ali Mamat

Several researches have been proposed over the past years to specify a selective access control for XML document. However, most of the previous researches only consider read privilege while specifying XML access control when access control policies support update rights is untouched. Therefore, a challenging issue is how to define an XML access control model to handle update operations that inc...

2003
Anthony Rhodes William Caelli

The essence of Role-Based Access Control (RBAC) is that system permissions are assigned to defined “roles” rather than to individual users. Users acquire these permissions by virtue of being authorised to act in a categorised manner known as a “role”. The driving motivation for RBAC is to simplify security policy administration while facilitating the definition of flexible, customised policies....

Journal: :BMJ supportive & palliative care 2015
Claire Dyason Jessica Simon Tracy Lynn Wityk Martin

OBJECTIVES Patients, physicians and the healthcare system are faced with the challenge of determining, and respecting, the medical wishes of an aging population. Our study sought to describe who participates in advance care planning (ACP) and decision-making for patients in long-term care and designated assisted living. METHODS In 2008, Alberta Health Services initiated its 'Advance Care Plan...

2003
Beata Sarna-Starosta Scott D. Stoller

Security-Enhanced Linux (SELinux) extends Linux with a flexible mandatory access control mechanism that enforces security policies expressed in SELinux’s policy language. Determining whether a given policy meets a site’s high-level security goals can be difficult, due to the low-level nature of the policy language and the size and complexity of SELinux policies. We propose a logic-programming-b...

2009
Mingsheng Zhang Xinqiang Ma Mingyi Zhang

In access control, it is a reasonable requirement that authorization mechanism can be implemented intelligently by logic programs. We propose an authorization framework based on logic programs, ranging from design, analysis, and implementation. Our proposed framework is powerful and useful, with RBAC features, flexible authorization, logic-based formalization and integration of policies. It can...

1997
Emil Lupu Morris Sloman Nicholas Yialelis

Distributed systems are increasingly being used in commercial environments necessitating the development of trustworthy and reliable security mechanisms. There is often no clear informal or formal specification of enterprise authorisation policies and no tools to translate policy specifications to access control implementation mechanisms such as capabilities or Access Control Lists. It is thus ...

2010
Teo Poh Kuang Hamidah Ibrahim

Recently research is focused on security policy integration and conflict reconciliation among various healthcare organizations. However, challenging security and privacy risks issues still arisen during sharing sensitive patient data in different large distributed organizations. In this paper, we proposed an approach for integrating security policies based on Role-Based Access Control (RBAC) po...

2007
Bandar Alhaqbani Colin J. Fidge

There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency. A number of countries are developing nationwide EHR systems to aggregate services currently provided by isolated Electronic Medical Record databases. However, such aggregation introduces new risks for patient privacy...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید