ACCESS CONTROL REQUIREMENTS FOR PRIVACY AND SECURITY

被引:0
|
作者
KINGSLAKE, R
机构
来源
INFORMATION PRIVACY | 1979年 / 1卷 / 07期
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:312 / 314
页数:3
相关论文
共 50 条
  • [11] Access Control and Security Properties Requirements Specification for Clouds' SecLAs
    Guesmi, Asma
    Clemente, Patrice
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 723 - 729
  • [12] Security and privacy requirements in interactive TV
    Dhiah el Diehn I. Abou-Tair
    Ingo Köster
    Kathrin Höfke
    Multimedia Systems, 2011, 17 : 393 - 408
  • [13] Visualising privacy and security for requirements engineering
    Kreeger, MN
    Duncan, I
    SERP'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2004, : 813 - 819
  • [14] Security and privacy requirements in interactive TV
    Abou-Tair, Dhiah el Diehn I.
    Koester, Ingo
    Hoefke, Kathrin
    MULTIMEDIA SYSTEMS, 2011, 17 (05) : 393 - 408
  • [15] Knowledge Based Access Control a model for security and privacy in the Big Data
    El haourani, Lamia
    Abou elkalam, Anas
    Ouahman, Abdelah Ait
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON SMART CITY APPLICATIONS (SCA'18), 2018,
  • [16] Security and privacy based access control model for internet of connected vehicles
    Habib, Muhammad Asif
    Ahmad, Mudassar
    Jabbar, Sohail
    Khalid, Shehzad
    Chaudhry, Junaid
    Saleem, Kashif
    Rodrigues, Joel J. P. C.
    Khalil, Muhammad Sayim
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 97 : 687 - 696
  • [17] Security, Privacy, and Access Control in Information-Centric Networking: A Survey
    Tourani, Reza
    Misra, Satyajayant
    Mick, Travis
    Panwar, Gaurav
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (01): : 566 - 600
  • [18] Collaborative Ehealth Privacy and Security: An Access Control With Attribute Revocation Based on OBDD Access Structure
    Edemacu, Kennedy
    Jang, Beakcheol
    Kim, Jong Wook
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2020, 24 (10) : 2960 - 2972
  • [19] A Comparative Study on Access Control Models and Security Requirements in Workflow Systems
    Boughrous, Monsef
    El Bakkali, Hanan
    INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS, IBICA 2017, 2018, 735 : 361 - 373
  • [20] Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art and Future Directions
    Ayedh, Aljuaid Turkea M.
    Wahab, Ainuddin Wahid Abdul
    Idris, Mohd Yamani Idna
    APPLIED SCIENCES-BASEL, 2023, 13 (14):