Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Jim Longstaff"'
Publikováno v:
2022 International Conference on Industrial IoT, Big Data and Supply Chain (IIoTBDSC).
Autor:
Mengda He, Jim Longstaff
Publikováno v:
TASE
We show how complex privacy requirements can be represented and processed by an extended model of Attribute Based Access Control (ABAC), working with a simple database applications pattern. During application model development, most likely based on U
Autor:
Jim Longstaff, Joanne Noble
Publikováno v:
BigDataService
We present concepts which can be used for the efficient implementation of Attribute Based Access Control (ABAC) in large applications using maybe several data storage technologies, including Hadoop, NoSQL and relational database systems. The ABAC aut
Autor:
Jim Longstaff, M. A. Lockyer
Publikováno v:
Medical Informatics and the Internet in Medicine. 30:157-166
This paper offers mechanisms capable of implementing the authorization functionality to be supported by the NHS Care Records Service. The patient-confidentiality model for the Care Records Service includes restricting access to data by placing the da
Autor:
Jim Longstaff, Tony Howitt
Publikováno v:
Case Studies in Secure Computing ISBN: 9780429090660
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8bfe97b359191906b7fc4233e0625054
https://doi.org/10.1201/b17352-9
https://doi.org/10.1201/b17352-9
Publikováno v:
Health Informatics Journal. 6:45-52
The primary care-based electronic health record (EHR) and the electronic patient record (EPR) are key features of the UK National Health Service (NHS) Information Strategy. We propose a model for EHR/EPR confidentiality - that is, for restricting acc
Autor:
Jim Longstaff
Publikováno v:
Cyber Security and Privacy ISBN: 9783642412042
We describe a new model for Attribute Based Access Control (ABAC) which handles negative permissions and overrides in a single permissions processing mechanism. The model lends itself to the generation of explanations and permissions review, which ca
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::17627e433a56ed0d8aabd201286e8d5e
https://doi.org/10.1007/978-3-642-41205-9_11
https://doi.org/10.1007/978-3-642-41205-9_11
Publikováno v:
Securing Electronic Business Processes ISBN: 9783528058876
This paper presents the Tees Confidentiality Model, an authorisation model which is suitable for complex web applications in addition to computer systems administration. It achieves its functionality by combining Identity-Based Access Control (IBAC)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d4d1ced787fd76c364b09888c86a47ea
https://doi.org/10.1007/978-3-322-84982-3_10
https://doi.org/10.1007/978-3-322-84982-3_10
Publikováno v:
SACMAT
We present a model of authorisation that is more powerful than Role Based Access Control (RBAC), and is suitable for complex web applications in addition to computer systems administration. It achieves its functionality by combining Identity Based Ac
Publikováno v:
ACM Workshop on Role-Based Access Control
A UML model of Authorisation is described, which was developed for an Electronic Medical Records application in collaboration with the UK NHS Information Authority. The model is an enhancement of the UK Healthcare Model (HcM), in that it provides ext