2013
DOI: 10.1016/j.protcy.2013.12.128
|View full text |Cite
|
Sign up to set email alerts
|

Group-based Discretionary Access Control for Epidemiological Resources

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…This group will be controlled by the owner of this group, thus allowing a high level of delegation of administrative capabilities. However, this mechanism can lead to serious security problems if the owner of the group is not trustworthy . For instance, the owner of a group may change the DAC security policy by using malicious software, such as Trojan horse.…”
Section: Access Control Mechanismsmentioning
confidence: 99%
“…This group will be controlled by the owner of this group, thus allowing a high level of delegation of administrative capabilities. However, this mechanism can lead to serious security problems if the owner of the group is not trustworthy . For instance, the owner of a group may change the DAC security policy by using malicious software, such as Trojan horse.…”
Section: Access Control Mechanismsmentioning
confidence: 99%
“…While assigning permissions and limitations to users, instead of working on a single user, it chooses to define groups that are controlled by the owner and introduces certain permissions and limitations to them. Of course, this situation can cause serious security leaks in the case that the owner is not trustworthy [4,61,62]. The most important feature that can cause problems with the system is that the owner can transfer his authority to someone else.…”
Section: Discretionary Access Controlmentioning
confidence: 99%
“…Another problem is the information leaks; in other words, as the control policies are determined according to desires without checking the information of the users by an owner, it does not distinguish between object or subject domains. This prevents it from being able to carry out logical comparisons [61,63]. Another important feature of the control is that it has a really high flexibility when compared to other controls [60,62].…”
Section: Discretionary Access Controlmentioning
confidence: 99%
“…Access control , through user permission definition and authorization, can ensure that only the users with legal rights can access the authorized data in the system, while unauthorized users cannot access the data (Zamite et al , 2013; Stefano et al , 2015). Access control is one of the basic security means of a database system, which can be divided into two categories, i.e.…”
Section: Introductionmentioning
confidence: 99%
“…Now, fingerprint verification (Hanene et al , 2013), face verification (Bianco, 2016), pupil verification (Villalobos-Castaldi et al , 2013) and other biometric verification become more and more mature, and most of them have been applied to user authentication. As a result, user identity authentication can be divided into single factor authentication (such as password, smart card, dynamic password and biometrics) and multifactor authentication (Bhargav-Spantzel et al , 2010) that combines multiple single factor authentications together to strengthen the security of user identity authentication. Access control , through user permission definition and authorization, can ensure that only the users with legal rights can access the authorized data in the system, while unauthorized users cannot access the data (Zamite et al , 2013; Stefano et al , 2015). Access control is one of the basic security means of a database system, which can be divided into two categories, i.e.…”
Section: Introductionmentioning
confidence: 99%