Basin, 2003 - Google Patents
Access Control and Security Policies IBasin, 2003
View PDF- Document ID
- 8371554653752083036
- Author
- Basin D
- Publication year
- Publication venue
- Information Security Material. Swiss Federal Institute of Technology Zurich [luentokalvot]
External Links
Snippet
A subject may only have access to personal data if this access is necessary to perform its current task, and only if the subject is authorized to perform this task. In addition, the purpose of its current task must correspond to the purposes for which the personal data was obtained …
- 230000007246 mechanism 0 description 8
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100450402B1 (en) | Access control method by a token with security attributes in computer system | |
Tari et al. | A role-based access control for intranet security | |
Sandhu et al. | Access control: principle and practice | |
US7827598B2 (en) | Grouped access control list actions | |
US7200869B1 (en) | System and method for protecting domain data against unauthorized modification | |
Majumder et al. | Taxonomy and classification of access control models for cloud environments | |
US20060265598A1 (en) | Access to a computing environment by computing devices | |
US6678682B1 (en) | Method, system, and software for enterprise access management control | |
US20140137185A1 (en) | Method and system for implementing mandatory file access control in native discretionary access control environments | |
US20060193467A1 (en) | Access control in a computer system | |
US8826457B2 (en) | System for enterprise digital rights management | |
US8805741B2 (en) | Classification-based digital rights management | |
Abrams | RENEWED UNDERSTANDING OF ACCESS CONTROL POLICIES¹ | |
Riad et al. | Adaptive XACML access policies for heterogeneous distributed IoT environments | |
Pramanik et al. | Security policies to mitigate insider threat in the document control domain | |
Jordan | Guide to Understanding Discretionary Access Control in Trusted Systems | |
De Capitani di Vimercati et al. | Authorization and access control | |
Delessy et al. | Patterns for access control in distributed systems | |
Basin | Access Control and Security Policies I | |
Brose | Access control | |
Gangwar et al. | Database Security Measurements Issues in Adhoc Network | |
Karp et al. | Split capabilities for access control | |
Basin | Access Control (I) | |
Cremers | Access Control (I) | |
Rissanen | Server based application level authorisation for Rotor |