Access control models for distributed information systems

被引:0
|
作者
Poniszewska-Maranda, Aneta [1 ]
机构
[1] Tech Univ Lodz, Inst Informat Technol, PL-90924 Lodz, Poland
来源
PRZEGLAD ELEKTROTECHNICZNY | 2010年 / 86卷 / 08期
关键词
access control; access control models; usage control; distributed information systems;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The appearance of new business models for the organization and enterprise activities in the network and the appearance of new protocols for information exchange provoke that the information is more and more distributed and the traditional access models are insufficient to solve the problems of information control. On the other hand we would like to control the usage and the diffusion of this information. All these new problems are connected with the usage control. The paper presents the different access control strategies in aspects of distributed information systems.
引用
收藏
页码:155 / 158
页数:4
相关论文
共 50 条
  • [1] Implementation of Access Control Model for Distributed Information Systems Using Usage Control
    Poniszewska-Maranda, Aneta
    [J]. SECURITY AND INTELLIGENT INFORMATION SYSTEMS, 2012, 7053 : 54 - 67
  • [2] Access control in distributed systems
    Bacon, J
    Moody, K
    [J]. COMPUTER SYSTEMS: THEORY, TECHNOLOGY AND APPLICATIONS: A TRIBUTE TO ROGER NEEDHAM, 2004, : 21 - 28
  • [3] Access Control in Distributed Systems
    Stojmenovic, Ivan
    [J]. TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 1 - 2
  • [4] Privacy-centric Access Control for Distributed Heterogeneous Medical Information Systems
    Khan, Atif
    McKillop, Ian
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON HEALTHCARE INFORMATICS (ICHI 2013), 2013, : 297 - 306
  • [5] Access Control Models in Heterogeneous Information Systems: from Conception to Exploitation
    Poniszewska-Maranda, Aneta
    [J]. 2008 INTERNATIONAL MULTICONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (IMCSIT), VOLS 1 AND 2, 2008, : 765 - 770
  • [6] Access Control for Emerging Distributed Systems
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    [J]. COMPUTER, 2018, 51 (10) : 100 - 103
  • [7] Adaptive access control in distributed systems
    Berrached, A
    Beheshti, M
    Dekorvin, A
    Alo, R
    [J]. IC'2001: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS I AND II, 2001, : 991 - 995
  • [8] Defence Methodologies of AV Evasion for access control and information assurance in Industrial Distributed control systems and SCADA systems
    Krishna, P. Sai
    Shaik, Arshad
    [J]. 2014 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2014,
  • [9] Access control in distributed object systems: Problems with access control lists
    Nagaraj, SV
    [J]. PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2001, : 163 - 164
  • [10] Information search models in distributed information systems of the internet
    A. V. Trusov
    V. A. Trusov
    [J]. Automatic Documentation and Mathematical Linguistics, 2011, 45 (4) : 211 - 212