The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
At present, emerging possibilities for patients to access their health records or health information may potentially lead to changes within the current health care delivery system from an institution-centered to a patient-centered model and an electronic personal health record (PHR) may greatly influence such a shift. However, the use of PHRs does introduce specific challenges in terms of accidental...
Access control is an effective way to ensure that users have access to information they need with system permissions securely, which has become a significant research problem on security issues recently. In most research areas, the RBAC theory are considered as a popular access control solutions for general-purpose, while lacks the ability to satisfy the specific requirements of the system. In this...
With the rapid development of the process of information of large-scale enterprises and organizations, information integration has become a hot research issue at present. Existing systems usually adopt access control model, such as ACL (access control list), MAC (mandatory access control) or RBAC (role-based access control), which results in the diversity of access control models in system integration...
As more and more sensitive information gets stored in the form of XML, proper access control to the XML documents becomes increasingly important. Moreover, XML documents may be available to users at certain time periods, and unavailable at others. To tackle such dynamic aspects, this paper proposes a bitmap-indexing scheme in which timed access control decisions can be effectively processed. The form...
In this paper, we take a rather different approach. We explore how to support security models for XML documents by leveraging on techniques developed for relational databases. More specifically, in our approach, (1) Users make XML queries against the given XML view/schema, (2) Access controls for XML data are specified in the relational database (3) Data are stored in relational databases, and (4)...
XML access control is a non-trivial topic as XML language becomes a standard for data representation and transmission on the Web. Existing access control approaches to the published XML documents are not likely to scale well since they specify and enforce their access control policies in centralized servers. This paper proposed a distributed model for providing a scalable access control to the published...
Recently XML has become an active research area. In particular, the need for an efficient secure access control of dynamic XML data in a ubiquitous data stream environment has become very important. But role-based prime 'number labeling (RPNL) has some problems. For example, The RPNL does not know a relationship between nodes such as ancestor- descendant relationship. The RPNL does not take update...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.