A cache considering role-based access control and trust in privilege management infrastructure

2006 ◽  
Vol 11 (6) ◽  
pp. 1827-1830 ◽  
Author(s):  
Zhang Shaomin ◽  
Wang Baoyi ◽  
Zhou Lihua
2012 ◽  
Vol 241-244 ◽  
pp. 3125-3129 ◽  
Author(s):  
Jin Li

For analyzing the multilayer structure of the J2EE, based on Role-Based Access Control, a model of privilege management infrastructure was designed. It was implemented after the discussion of the existing privilege management system. Moreover, the safe authority control was realized with good effect.


Author(s):  
Snezana Sucurovic

This chapter presents security solutions in integrated patient-centric Web-based health-care information systems, also known as electronic healthcare record (EHCR). Security solutions in several projects have been presented and in particular a solution for EHCR integration from scratch. Implementations of Public key infrastructure, privilege management infrastructure, role based access control and rule based access control in EHCR have been presented. Regarding EHCR integration from scratch architecture and security have been proposed and discussed. This integration is particularly suitable for developing countries with wide spread Internet while at the same time the integration of heterogeneous systems is not needed. The chapter aims at contributing to initiatives for implementation of national and transnational EHCR in security aspect.


2011 ◽  
pp. 1949-1964
Author(s):  
Snezana Sucurovic

This chapter presents security solutions in integrated patient-centric Web-based health-care information systems, also known as electronic healthcare record (EHCR). Security solutions in several projects have been presented and in particular a solution for EHCR integration from scratch. Implementations of Public key infrastructure, privilege management infrastructure, role based access control and rule based access control in EHCR have been presented. Regarding EHCR integration from scratch architecture and security have been proposed and discussed. This integration is particularly suitable for developing countries with wide spread Internet while at the same time the integration of heterogeneous systems is not needed. The chapter aims at contributing to initiatives for implementation of national and transnational EHCR in security aspect.


2015 ◽  
Vol 64 (9) ◽  
pp. 2490-2505 ◽  
Author(s):  
Dianxiang Xu ◽  
Michael Kent ◽  
Lijo Thomas ◽  
Tejeddine Mouelhi ◽  
Yves Le Traon

Sign in / Sign up

Export Citation Format

Share Document