[go: up one dir, main page]

Basin, 2003 - Google Patents

Access Control and Security Policies I

Basin, 2003

View PDF
Document ID
8371554653752083036
Author
Basin D
Publication year
Publication venue
Information Security Material. Swiss Federal Institute of Technology Zurich [luentokalvot]

External Links

Snippet

A subject may only have access to personal data if this access is necessary to perform its current task, and only if the subject is authorized to perform this task. In addition, the purpose of its current task must correspond to the purposes for which the personal data was obtained …
Continue reading at archiv.infsec.ethz.ch (PDF) (other versions)

Similar Documents

Publication Publication Date Title
KR100450402B1 (en) Access control method by a token with security attributes in computer system
Tari et al. A role-based access control for intranet security
Sandhu et al. Access control: principle and practice
US7827598B2 (en) Grouped access control list actions
US7200869B1 (en) System and method for protecting domain data against unauthorized modification
Majumder et al. Taxonomy and classification of access control models for cloud environments
US20060265598A1 (en) Access to a computing environment by computing devices
US6678682B1 (en) Method, system, and software for enterprise access management control
US20140137185A1 (en) Method and system for implementing mandatory file access control in native discretionary access control environments
US20060193467A1 (en) Access control in a computer system
US8826457B2 (en) System for enterprise digital rights management
US8805741B2 (en) Classification-based digital rights management
Abrams RENEWED UNDERSTANDING OF ACCESS CONTROL POLICIES¹
Riad et al. Adaptive XACML access policies for heterogeneous distributed IoT environments
Pramanik et al. Security policies to mitigate insider threat in the document control domain
Jordan Guide to Understanding Discretionary Access Control in Trusted Systems
De Capitani di Vimercati et al. Authorization and access control
Delessy et al. Patterns for access control in distributed systems
Basin Access Control and Security Policies I
Brose Access control
Gangwar et al. Database Security Measurements Issues in Adhoc Network
Karp et al. Split capabilities for access control
Basin Access Control (I)
Cremers Access Control (I)
Rissanen Server based application level authorisation for Rotor