Please use this identifier to cite or link to this item:
https://digital.lib.ueh.edu.vn/handle/UEH/62281
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Nguyen T.T. | - |
dc.contributor.other | Pham N.H.N. | - |
dc.contributor.other | Thi Q.N.T. | - |
dc.date.accessioned | 2021-09-05T02:41:53Z | - |
dc.date.available | 2021-09-05T02:41:53Z | - |
dc.date.issued | 2016 | - |
dc.identifier.isbn | 9783319480572 | - |
dc.identifier.uri | http://digital.lib.ueh.edu.vn/handle/UEH/62281 | - |
dc.description.abstract | The Rew-XAC model, based on Extensible Access Control Markup Language (XACML) 3.0, has been developed to solve the problem in the case that requests receive “Not Applicable” responses from the policy decision point (PDP). According to the most applicable policy that has the best score computed by a fuzzy function, the Rew-XAC model carried out rewriting the request. However, an important issue not addressed yet in the Rew-XAC model is that there has more than one policy with the same highest fuzzy value. In this paper, we propose an enhancement that assigns a union operator for all resource filter expressions produced from the related modules in the Rew-XAC model for each selected policy to the rewritten request. Besides, we demonstrate the potential of our model through analyzing the complex security requirements for a case study in the healthcare domain, and then propose a mechanism integrated with the proposed model to support access control for workflow data. We also perform an experiment using the dataset of policies in the case study to verify the feasibility of our approach in the healthcare domain that needs the data-protection rigorously complying with the regulations. | en |
dc.format | Portable Document Format (PDF) | - |
dc.language.iso | eng | - |
dc.publisher | Springer Verlag | - |
dc.relation.ispartof | Future Data and Security Engineering. FDSE 2016. Lecture Notes in Computer Science | - |
dc.relation.ispartofseries | Vol. 10018 | - |
dc.rights | Springer International Publishing AG 2016 | - |
dc.subject | Access control | en |
dc.subject | Rew-XAC | en |
dc.subject | Rewriting | en |
dc.subject | Workflow data | en |
dc.subject | XACML | en |
dc.title | An enhancement of the Rew-XAC model for workflow data access control in healthcare | en |
dc.type | Conference Paper | en |
dc.identifier.doi | https://doi.org/10.1007/978-3-319-48057-2_18 | - |
dc.format.firstpage | 251 | - |
dc.format.lastpage | 263 | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.grantfulltext | none | - |
item.cerifentitytype | Publications | - |
item.fulltext | Only abstracts | - |
item.openairetype | Conference Paper | - |
item.languageiso639-1 | en | - |
Appears in Collections: | Conference Papers |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.