The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The e-Health is going to change the way how patients and healthcare providers interact. The exchange of confidential and integer information is one of the major open issues for the health care sector. While it is quite easy to enforce fine grain access control policies to new well structured medical records managed by newly designed information systems, many eHealth systems are based on “document...
This concept paper surveys the use of UML 2.0 and basic formal logic notations to represent use case scenarios of models of trust for a digital identity. Various definitions are provided as well as an algorithm that contextualizes the notion of trust establishment given the prescribed use of the identity. The motivation for this work is based on earlier work defined by Indrashki Ray, Indrajit Ray...
End-to-end security in collaborative system has two inferences: the secure delivery of service and the `due usage' of it. The fulfillment of this requirement involves re-thinking the security policy model of collaborative systems. This paper analyses the factors that impact security in such systems. Based on this, a general architecture is proposed with a collaboration-based policy model specified...
Traditional access control mechanisms prevent illegal access by controlling access right before executing an action; they belong to a class of a priori security solutions and, from this point of view, they have some limitations, like inflexibility in unanticipated circumstances. By contrast, a posteriori mechanisms enforce policies not by preventing unauthorized access, but rather by deterring it...
Degree of identity assurance has been realized in several different approaches to authentication assurance frameworks; to become one of the parameters used in decision making about whether to grant or deny a service. However, current approaches do not look at diversity of authentication mechanisms, used for establishing the identity of a user, as an application to mitigate identity threats and consequently...
Cloud environments offer a variety of concrete and abstracted entities which need to be identified. An example of cloud environment is the European project RESERVOIR, which similarly to other platforms characterized by a high level of dynamism, needs to identify and resolve resources. RESERVOIR has to manage allocation, deallocation and migration of virtual machines from an execution context to another...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.