Compact access control labeling for efficient secure XML query evaluation
Data & Knowledge Engineering
Towards secure multi-sited transactional revision control systems
Computer Standards & Interfaces
Audit-Based Access Control for Electronic Health Records
Electronic Notes in Theoretical Computer Science (ENTCS)
Human-to-Human authorization for resource sharing in SHAD: Roles and protocols
Pervasive and Mobile Computing
Trust-enhanced Security in Location-based Adaptive Authentication
Electronic Notes in Theoretical Computer Science (ENTCS)
Level-4 SaaS applications for healthcare industry
Proceedings of the 2nd Bangalore Annual Compute Conference
An extended JADE-S based framework for developing secure Multi-Agent Systems
Computer Standards & Interfaces
A security framework for a workflow-based grid development platform
Computer Standards & Interfaces
Fault coverage of Constrained Random Test Selection for access control: A formal analysis
Journal of Systems and Software
Metrics for characterizing the form of security policies
The Journal of Strategic Information Systems
Modeling process-related RBAC models with extended UML activity models
Information and Software Technology
Applying a usage control model in an operating system kernel
Journal of Network and Computer Applications
A secure coordination of agents with nonmonotonic soft Concurrent Constraint Programming
Proceedings of the 27th Annual ACM Symposium on Applied Computing
On the exploitation of process mining for security audits: the conformance checking case
Proceedings of the 27th Annual ACM Symposium on Applied Computing
A unified attribute-based access control model covering DAC, MAC and RBAC
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
BTA: architecture for reusable business tier components with access control
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part III
A role-based administration model for attributes
Proceedings of the First International Workshop on Secure and Resilient Architectures and Systems
HyXAC: a hybrid approach for XML access control
Proceedings of the 18th ACM symposium on Access control models and technologies
A review of GENI authentication and access control mechanisms
International Journal of Security and Networks
Model-based, event-driven programming paradigm for interactive web applications
Proceedings of the 2013 ACM international symposium on New ideas, new paradigms, and reflections on programming & software
Reachability analysis for role-based administration of attributes
Proceedings of the 2013 ACM workshop on Digital identity management
Required behavior of sequence diagrams: Semantics and conformance
ACM Transactions on Software Engineering and Methodology (TOSEM)
DR BACA: dynamic role based access control for Android
Proceedings of the 29th Annual Computer Security Applications Conference
Modelling context-aware RBAC models for mobile business processes
International Journal of Wireless and Mobile Computing
Mining Deviations from Patient Care Pathways via Electronic Medical Record System Audits
ACM Transactions on Management Information Systems (TMIS) - Special Issue on Informatics for Smart Health and Wellbeing
A Patient Privacy Protection Scheme for Medical Information System
Journal of Medical Systems
The RBAC model and implementation architecture in multi-domain environment
Electronic Commerce Research
Hi-index | 0.25 |
Access control constrains what a user can do directly, as well as what programs executing on behalf of the users are allowed to do. In this way access control seeks to prevent activity that could lead to a breach of security. This article explains access control and its relationship to other security services such as authentication, auditing, and administration. It then reviews the access matrix model and describes different approaches to implementing the access matrix in practical systems, and follows with a discussion of access control policies commonly found in current systems, and a brief consideration of access control administration