2014
DOI: 10.1016/j.future.2013.05.010
|View full text |Cite
|
Sign up to set email alerts
|

An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0
4

Year Published

2015
2015
2020
2020

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 83 publications
(39 citation statements)
references
References 37 publications
0
35
0
4
Order By: Relevance
“…For example, the trust level of a user requesting access from outside the hospital can be evaluated against the security level of the network connection, security clearances of the user, the time of which the access has been requested and so forth [13]. Moreover, recommender systems can be used for recommending trust levels for users; especially when the users are not known to the hospital's system a priori but the organization to whom they belong has some collaborations with the hospital that uses the recommender system [30]. …”
Section: S S Alaqeeli Et Almentioning
confidence: 99%
See 2 more Smart Citations
“…For example, the trust level of a user requesting access from outside the hospital can be evaluated against the security level of the network connection, security clearances of the user, the time of which the access has been requested and so forth [13]. Moreover, recommender systems can be used for recommending trust levels for users; especially when the users are not known to the hospital's system a priori but the organization to whom they belong has some collaborations with the hospital that uses the recommender system [30]. …”
Section: S S Alaqeeli Et Almentioning
confidence: 99%
“…is computed, and since the objective is to find the maximum number of data objects that can be revealed, with accordance to HIPPA rule of privacy, lines (26)(27)(28)(29)(30)(31)(32)(33) show the set of data that can be exposed.…”
Section: Risk Mitigation Data Disclosure Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, we state some preliminary definitions of risk and security needed to form a collaboration system for risk mitigation, which is expected to rely on several security aspects [9], such as accountability or authentication and access control mechanisms [10]. For systems in which unknown users may enter, the concept of trust is usually used to monitor users behavior along time [11].…”
Section: Framing Data Structuresmentioning
confidence: 99%
“…In this work, the authors consider local and global situational factors as what happens in the environment as an attribute; however, they do not introduce methods to evaluate and handle the risk nor the tool architecture and implementation issues. More recently, Smari et al [9] extend the ABAC model to incorporate trust and privacy issues in cross-organizational collaborative crisis management. Many issues are treated, such as network security for communications during the crisis, and trust in collaborations.…”
Section: Related Workmentioning
confidence: 99%