Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
At present, emerging possibilities for patients to access their health records or health information may potentially lead to changes within the current health care delivery system from an institution-centered to a patient-centered model and an electronic personal health record (PHR) may greatly influence such a shift. However, the use of PHRs does introduce specific challenges in terms of accidental...
Access control is an effective way to ensure that users have access to information they need with system permissions securely, which has become a significant research problem on security issues recently. In most research areas, the RBAC theory are considered as a popular access control solutions for general-purpose, while lacks the ability to satisfy the specific requirements of the system. In this...
With the rapid development of the process of information of large-scale enterprises and organizations, information integration has become a hot research issue at present. Existing systems usually adopt access control model, such as ACL (access control list), MAC (mandatory access control) or RBAC (role-based access control), which results in the diversity of access control models in system integration...
As more and more sensitive information gets stored in the form of XML, proper access control to the XML documents becomes increasingly important. Moreover, XML documents may be available to users at certain time periods, and unavailable at others. To tackle such dynamic aspects, this paper proposes a bitmap-indexing scheme in which timed access control decisions can be effectively processed. The form...
In this paper, we take a rather different approach. We explore how to support security models for XML documents by leveraging on techniques developed for relational databases. More specifically, in our approach, (1) Users make XML queries against the given XML view/schema, (2) Access controls for XML data are specified in the relational database (3) Data are stored in relational databases, and (4)...
XML access control is a non-trivial topic as XML language becomes a standard for data representation and transmission on the Web. Existing access control approaches to the published XML documents are not likely to scale well since they specify and enforce their access control policies in centralized servers. This paper proposed a distributed model for providing a scalable access control to the published...
Recently XML has become an active research area. In particular, the need for an efficient secure access control of dynamic XML data in a ubiquitous data stream environment has become very important. But role-based prime 'number labeling (RPNL) has some problems. For example, The RPNL does not know a relationship between nodes such as ancestor- descendant relationship. The RPNL does not take update...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.