Skip to Main Content
Keywords: Access control
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Information and Computer Security (2020) 28 (3): 373–395.
Published: 15 June 2020
.... This paper aims to present a model for securing the EHR based on role-based access control (RBAC), attribute-based access control (ABAC) and the Clark-Wilson model. Design/methodology/approach A systematic literature review was conducted which resulted in the collection of secondary data that was used...
Journal Articles
Information and Computer Security (2018) 26 (4): 454–471.
Published: 08 October 2018
... uncovered during a grounded theory analysis of semi-structured interview data can be interpreted as policy attributes, the paper develops a grounded theory-based methodology that can be extended to elicit attribute-based access control style policies. In this methodology, user-participants are interviewed...
Journal Articles
Information and Computer Security (2016) 24 (3): 242–254.
Published: 11 July 2016
... be contacted at: ashumilov@it-claim.ru 19 12 2014 12 07 2015 13 07 2015 © Emerald Group Publishing Limited 2016 Emerald Group Publishing Limited Licensed re-use rights only Innovation Computer security Access control Client-server computing That kind of an editor...
Journal Articles
Journal Articles
Information and Computer Security (2015) 23 (1): 73–101.
Published: 09 March 2015
... to this attack, although they have now mitigated the issue via CSRF tokens and the use of the “state” parameter. Kevin Curran can be contacted at: kj.curran@ulster.ac.uk © Emerald Group Publishing Limited 2015 Security Access control Integration between applications has become a commodity...
Journal Articles
Journal Articles
Information Management & Computer Security (2002) 10 (5): 225–236.
Published: 01 December 2002
...Chang N. Zhang; Cungang Yang Information flow analysis is a necessary step to determine the information security for a given system. In this paper, we introduce an object oriented role‐based access control model (ORBAC) and illustrate that the confinement problem may occur on the ORBAC based system...
Journal Articles
Information Management & Computer Security (2001) 9 (3): 126–133.
Published: 01 August 2001
...Reinhardt A. Botha; Jan H.P. Eloff Workflow systems are often associated with business process re‐engineering (BPR). This paper argues that the functional access control requirements in workflow systems are rooted in the scope of a BPR project. A framework for access control in workflow systems...
Journal Articles
Information Management & Computer Security (1997) 5 (2): 79–80.
Published: 01 May 1997
...Charles Cresson Wood Discusses the necessity of computer access control mechanisms, particularly passwords, to protect information. Suggests that many organizations allow practices which compromise the security of their data. Highlights a policy on the proper storage of passwords and other security...
Journal Articles
Information Management & Computer Security (1996) 4 (2): 18–26.
Published: 01 May 1996
... to password‐cracking programs run by hackers, while external access via the Internet can be securely controlled by the TurnStyle Firewall System and the TurnStyle Internet Module. © MCB UP Limited 1996 Access control Data security Internet Security products Unix Security should...
Journal Articles
Information Management & Computer Security (1996) 4 (2): 7–10.
Published: 01 May 1996
.... The designs of an operator’s GSM system must take into account the environment and have secure procedures such as: the generation and distribution of keys; exchange of information between operators; the confidentiality of the algorithms. © MCB UP Limited 1996 Access control Data...
Journal Articles
Journal Articles
Information Management & Computer Security (1996) 4 (1): 32–37.
Published: 01 March 1996
... markets and technologies. Discusses security policy, privacy, security logs, encryption, virus attacks, Internet concerns, firewalls and auditing. Outlines the work of the Computer Emergency Response Team and the Computer Incident Advisory Capability in the USA. © MCB UP Limited 1996 Access...
Journal Articles
Information Management & Computer Security (1995) 3 (4): 27–33.
Published: 01 October 1995
... provided in the mainframe era has not been provided in the distributed environment. What must be considered now are the following issues:logical access controls access all platforms; improved network and platform reliability, and the ability to recover readily from disruption and disasters. Concludes...
Journal Articles
Information Management & Computer Security (1995) 3 (4): 3–14.
Published: 01 October 1995
... and solutions which can minimize exposures and business impact. © MCB UP Limited 1995 Access control Computer hardware Information technology Location Risk The placement of computer and communications equipment within premises is partly based on physical limitations, partly...
Journal Articles
Information Management & Computer Security (1995) 3 (1): 28–29.
Published: 01 March 1995
...John Campbell Describes a fifth‐operation software tool which is a powerful network manager that guards systems from intrusion and provides an accurate system asset register. © MCB UP Limited 1995 Access control Applications software Data security Local area networks Office...
Journal Articles
Information Management & Computer Security (1995) 3 (1): 30–37.
Published: 01 March 1995
...‐in is assumed; lock‐out of account when log‐in limit is exceeded; how long VMS will remember a log‐in failure,and other parameters dealing with dial‐up line access[ 6 ]. Access control Computer fraud Data security Espionage Information systems Laws Personnel policy Viruses Employees...
Journal Articles
Information Management & Computer Security (1993) 1 (3): 4–11.
Published: 01 March 1993
... to a network,can be included and easily administered under this architecture. © MCB UP Limited 1993 Access control Computer architectures Computer downsizing Data security 4 INFORMATION MANAGEMENT & COMPUTER SECURITY 1,3 A discussion of a "workstation-centric" architecture designed to provide...
Journal Articles
Information Management & Computer Security (1993) 1 (1): 19–21.
Published: 01 January 1993
... of security officers in a large Australian organization examined the security awareness of these officers and the reasons for, and current management practices of, shared logons. It was found that work flow efficiency was more important than access control and that policies for user group access control...

or Create an Account

Close Modal
Close Modal