Mehregan et al., 2016 - Google Patents
Policy negotiation for co-owned resources in relationship-based access controlMehregan et al., 2016
View PDF- Document ID
- 14178168317693743288
- Author
- Mehregan P
- Fong P
- Publication year
- Publication venue
- Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies
External Links
Snippet
The collaborative nature of content development has given rise to the novel problem of multiple ownership in access control, such that a shared resource is administrated simultaneously by co-owners who may have conflicting privacy preferences and/or sharing …
- 230000018109 developmental process 0 abstract description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
- G06F17/2288—Version control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
- G06F17/2247—Tree structured documents; Markup, e.g. Standard Generalized Markup Language [SGML], Document Type Definition [DTD]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/24—Editing, e.g. insert/delete
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Viriyasitavat et al. | Blockchain characteristics and consensus in modern business processes | |
Nawari et al. | Blockchain and the built environment: Potentials and limitations | |
Mehregan et al. | Policy negotiation for co-owned resources in relationship-based access control | |
Ahmed et al. | Static verification of security requirements in role based CSCW systems | |
Altaf et al. | A survey of blockchain technology: Architecture, applied domains, platforms, and security threats | |
WO2022051007A1 (en) | Enforcement flow for pipelines that include entitlements | |
Zichichi et al. | Decentralized personal data marketplaces: How participation in a DAO can support the production of citizen-generated data | |
Governatori et al. | A modelling and reasoning framework for social networks policies | |
Tsankov et al. | Decentralized composite access control | |
Woolley | Getting along with frenemies: enhancing multi-competitor coopetition governance through artificial intelligence and blockchain | |
Arachchilage et al. | A taxonomy for securely sharing information among others in a trust domain | |
Denhere et al. | A TOGAF based interoperable health information system needs assessment for practitioner–patient interaction | |
Fong et al. | Relational abstraction in community-based secure collaboration | |
Kombe | A secure and interoperable blockchain-based information sharing system for healthcare providers in developing countries | |
Rouhani | Data trust framework using blockchain and smart contracts | |
Crampton et al. | ARPPM: Administration in the RPPM model | |
Anita et al. | Blockchain consensus algorithms and platforms: a survey | |
van Binsbergen et al. | AMdEX Reference Architecture–version 1.0. 0 | |
Lobo | Relationship‐based access control: More than a social network access control model | |
Cherif | Access control models for collaborative applications | |
Belokosztolszki | Role-based access control policy administration | |
Dabral et al. | Exploring Consequences of Privacy Policies with Narrative Generation via Answer Set Programming | |
Mallios et al. | Probabilistic cost enforcement of security policies | |
Singh et al. | Detection of frauds in healthcare sector by using blockchain | |
Wang et al. | Collaborative Construction Method of Biomedical Knowledge Graph Based on Multi-Blockchain |