The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Organizations respond to opportunities and risks by strategic decisions. Strategic decisions ensure the sustainable existence of organizations, but require continuous organizational change. Organizational change includes the redesign of business processes. Processes are subject to internal and external requirements. Requirements include the alignment to strategic goals, the effective and efficient...
The Access Policy Tool (APT) analyzes the firewall configuration in an enterprise network for compliance with a global access policy, such as one that describes the industry's best practices. APT is the culmination of several years of academic research and development; in this last year, we have been working with industrial partners in the energy sector to validate the results of the tool. More importantly,...
The contemporary Web is heading towards its next stage of evolution. From a clump of unorganized information spaces, the Web is becoming more focused on the meaning of information that is a Semantic Web. Trust is an integral component in semantic web, allowing people to act under uncertainty and with the risk of negative consequences. In this paper we discussed trust management and its connection...
For the fact that traditional Access Control models are mostly static, coarsely grained, and not well suited for solving the application in the security of web services. This paper extends access control models by introducing actions based on attribute-based access control. The model avoids the complex structure of multi-attribute and solves the problem that relevant dynamic authorization and permission...
The rapid growth of Internet / Intranet application and development of Web technology provides an ideal platform for Web workflow management system and the Web_based workflow management service provides condition for distributed working and inter-enterprise corporation and it has become the characteristic of the next-generation workflow management. The WFMS prototype which this paper researched on...
Along with the further improvement of Chinese medical aid system in 21st century, the system interface and security has been in front us. Web services are being positioned as the technological solution framework for achieving this aggregation in the context of cross-organizational business applications through the Internet. In such a context, security is currently one of the main concerns and several...
Next generation of knowledge management systems will utilize different methods and techniques from the following communities to achieve the vision of ubiquitous knowledge: Semantic Web and Web Services, Agent Technologies, Mobility. A knowledge asset (Web resource or service) to become an intellectual capital must be shared; it increases in value while being used. XML is the ideal format for the exchange...
More and more companies are adopting the emerging business model usually referred as ??service virtualization??. In service virtualization scenario, resource providers can host third-party services, as long as their resource and security requirements are compatible with those of service providers. XACML is a standard language for access control specification. We propose a complete support system for...
XML has been in prevalent use nowadays, so it is necessary to take measures to ensure the security of XML data. Recently, many access control models have been presented and many models are based on the concept of security views, which provide for each user group (a) an XML view consisting of all and only the information that the users are authorized to access, and (b) a view DTD that the XML view...
Due to the rapid increasing of system users, it is becoming a tiresome task for the administrator to assign roles and maintain permissions in traditional RBAC model. In order to simplify the administrator's work and standardize security strategy, human's fuzzy decision-making capability is required. In this paper, an optimized RBAC model based on fuzzy theory is proposed. Bitmap matrix is used for...
Electronic health information systems (e.g. health record systems, clinical information systems) can assist in the provision of better health care services for patients and help doctors and other health care workers treat and diagnose patients more effectively and efficiently. One of the most important issues in health-related information systems is high information security and stringent access control...
With the rapid development of the process of information of large-scale enterprises and organizations, information integration has become a hot research issue at present. Existing systems usually adopt access control model, such as ACL (access control list), MAC (mandatory access control) or RBAC (role-based access control), which results in the diversity of access control models in system integration...
There have been extensive studies on RFID security, in particular authentication and privacy issues. In most protocols, the discussions focus on scenarios that RFID tags are used mainly for tracing or identification, and the access to data stored on RFID is enforced through authentication. Recently, there rise interests of using RFID tags as distributed storage, e.g., storing floorplans which can...
The spatial resources include data resources, function resources and authority resources. In order to realize effective integration and management of the spatial resources under the distributed heterogeneous environment, the land resources data center has provided the rules-driven of dynamic directory. The composition operators were constructed by relation algebra operations such as selection, projection...
The loosely coupled nature of service-oriented architectures raises the question how information for access control can be managed in an efficient way. Several specifications for Web services exist to describe security requirements and to facilitate a provision of identity information. However, the integration of different standards regarding the expression of identity information in policies, claims...
With the fast development of high speed wireless technologies and the growing population of mobile portable devices, location information is potentially available for access control systems. Such applications are especially meaningful in emergency situations, where quick responses are urgently required for persons to be physically present in a certain place to perform sensitive tasks without conflicting...
In this paper, we compare three open source access control languages, XACML, JAAS and Java ACL. In addition to a conceptual analysis, we use a Web-based health care system as a common application, in which controlled access is implemented through each of the languages. We compare the languages using standard software metrics, such as reusability, policy expressiveness, extensibility, error handling,...
Access control mechanisms control which subjects (such as users or processes) have access to which resources. To facilitate managing access control, policy authors increasingly write access control policies in XACML. Access control policies written in XACML could be amenable to multiple-duty-related security leakage, which grants unauthorized access to a user when the user takes multiple duties (e...
The adoption of XACML as the standard for specifying access control policies for various applications, especially Web services is vastly increasing. A policy evaluation engine can easily become a bottleneck when enforcing large policies. In this paper we propose an adaptive approach for XACML policy optimization. We proposed a clustering technique that categorizes policies and rules within a policy...
An administrative role-based access control (ARBAC) model specifies administrative policies over a role-based access control (RBAC) system, where an administrative permission may change an RBAC policy by updating permissions assigned to roles, or assigning/revoking users to/from roles. Consequently, enforcing ARBAC policies over an active access controller while some users are using protected resources...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.