[go: up one dir, main page]

Mehregan et al., 2016 - Google Patents

Policy negotiation for co-owned resources in relationship-based access control

Mehregan et al., 2016

View PDF
Document ID
14178168317693743288
Author
Mehregan P
Fong P
Publication year
Publication venue
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies

External Links

Snippet

The collaborative nature of content development has given rise to the novel problem of multiple ownership in access control, such that a shared resource is administrated simultaneously by co-owners who may have conflicting privacy preferences and/or sharing …
Continue reading at cspages.ucalgary.ca (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/22Manipulating or registering by use of codes, e.g. in sequence of text characters
    • G06F17/2288Version control
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/22Manipulating or registering by use of codes, e.g. in sequence of text characters
    • G06F17/2247Tree structured documents; Markup, e.g. Standard Generalized Markup Language [SGML], Document Type Definition [DTD]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/24Editing, e.g. insert/delete
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/468Specific access rights for resources, e.g. using capability register
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Similar Documents

Publication Publication Date Title
Viriyasitavat et al. Blockchain characteristics and consensus in modern business processes
Nawari et al. Blockchain and the built environment: Potentials and limitations
Mehregan et al. Policy negotiation for co-owned resources in relationship-based access control
Ahmed et al. Static verification of security requirements in role based CSCW systems
Altaf et al. A survey of blockchain technology: Architecture, applied domains, platforms, and security threats
WO2022051007A1 (en) Enforcement flow for pipelines that include entitlements
Zichichi et al. Decentralized personal data marketplaces: How participation in a DAO can support the production of citizen-generated data
Governatori et al. A modelling and reasoning framework for social networks policies
Tsankov et al. Decentralized composite access control
Woolley Getting along with frenemies: enhancing multi-competitor coopetition governance through artificial intelligence and blockchain
Arachchilage et al. A taxonomy for securely sharing information among others in a trust domain
Denhere et al. A TOGAF based interoperable health information system needs assessment for practitioner–patient interaction
Fong et al. Relational abstraction in community-based secure collaboration
Kombe A secure and interoperable blockchain-based information sharing system for healthcare providers in developing countries
Rouhani Data trust framework using blockchain and smart contracts
Crampton et al. ARPPM: Administration in the RPPM model
Anita et al. Blockchain consensus algorithms and platforms: a survey
van Binsbergen et al. AMdEX Reference Architecture–version 1.0. 0
Lobo Relationship‐based access control: More than a social network access control model
Cherif Access control models for collaborative applications
Belokosztolszki Role-based access control policy administration
Dabral et al. Exploring Consequences of Privacy Policies with Narrative Generation via Answer Set Programming
Mallios et al. Probabilistic cost enforcement of security policies
Singh et al. Detection of frauds in healthcare sector by using blockchain
Wang et al. Collaborative Construction Method of Biomedical Knowledge Graph Based on Multi-Blockchain