2017 International Carnahan Conference on Security Technology (ICCST) 2017
DOI: 10.1109/ccst.2017.8167833
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating ISO 14441 privacy requirements on role based access control (RBAC) restrict mode via Colored Petri Nets (CPN) modeling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…The goal of this article is to enable the basic DAC capability to be integrated into the RBAC Core features by simulating an access decision flow by means of a Colored Petri‐Net (CPN) design. This involved extending a previously implemented RBAC model 8 by adding data owner authorization prior to the data manipulations and included patient EHR functionalities based on role logic. This work reuses our previous CPN model with adaptations to illustrate the new DAC idea.…”
Section: Objectives and Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…The goal of this article is to enable the basic DAC capability to be integrated into the RBAC Core features by simulating an access decision flow by means of a Colored Petri‐Net (CPN) design. This involved extending a previously implemented RBAC model 8 by adding data owner authorization prior to the data manipulations and included patient EHR functionalities based on role logic. This work reuses our previous CPN model with adaptations to illustrate the new DAC idea.…”
Section: Objectives and Methodsmentioning
confidence: 99%
“…Instead, we advocate that there should be a parallel implementation. We have updated the CPN diagram from our RBAC simulation, 8 to ensure that tokens representing objects and lists of operations reflect the PPI announcements on the “Role administration” module. In addition, we have connected available roles from the “New roles” repository to both the regular RBAC and DAC‐aware “Role assignment” module flow.…”
Section: Objectives and Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…information about a child based on their location and detailed behavioral patterns that may be used for the undesirable purposes [6]. Referring to de Carvalho and Bandiera-Paiva [17], the privacy and security requirements to protect any data, and restrict principals' interaction, must consider all users [17].…”
Section: Introductionmentioning
confidence: 99%