ACCESS CONTROL REQUIREMENTS FOR PRIVACY AND SECURITY

被引:0
|
作者
KINGSLAKE, R
机构
来源
INFORMATION PRIVACY | 1979年 / 1卷 / 07期
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:312 / 314
页数:3
相关论文
共 50 条
  • [1] Security and access control requirements for computerized systems
    McDowall, R. D.
    LC GC EUROPE, 2007, 20 (11) : 583 - 585
  • [2] Blockchain for IoT Access Control, Security and Privacy: A Review
    Patil, Pradnya
    Sangeetha, M.
    Bhaskar, Vidhyacharan
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (03) : 1815 - 1834
  • [3] Access control for security and privacy in ubiquitous computing environments
    Yamada, S
    Kamioka, E
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 846 - 856
  • [4] Blockchain for IoT Access Control, Security and Privacy: A Review
    Pradnya Patil
    M. Sangeetha
    Vidhyacharan Bhaskar
    Wireless Personal Communications, 2021, 117 : 1815 - 1834
  • [5] Requirements for scalable access control and security management architectures
    Keromytis, Angelos D.
    Smith, Jonathan M.
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2007, 7 (02)
  • [6] Security and Privacy Frameworks for Access Control Big Data Systems
    Centonze, Paolina
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 59 (02): : 361 - 374
  • [7] Implementation of security and privacy in ePassports and the extended access control infrastructure
    Rana, Antonia
    Sportiello, Luigi
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2014, 7 (04) : 233 - 243
  • [8] Multilayer privacy-preserving model for security and privacy access control in edge computing
    Karthikeyan, K.
    Madhavan, P.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (10):
  • [9] A Card Requirements Language Enabling Privacy-Preserving Access Control
    Camenisch, Jan
    Moedersheim, Sebastian
    Neven, Gregory
    Preiss, Franz-Stefan
    Sommer, Dieter
    SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2010, : 119 - 128
  • [10] A mandatory access control policy model for information security requirements
    Leiwo, J
    Gamage, C
    Zheng, YL
    PROCEEDINGS OF THE 21ST AUSTRALASIAN COMPUTER SCIENCE CONFERENCE, ACSC'98, 1998, 20 (01): : 527 - 538