|
1-10 of 14 reviews |
Date Reviewed | |
|
A formal proximity model for RBAC systems Gupta A., Kirkpatrick M., Bertino E. Computers and Security 4152-67, 2014. Type: Article
Gupta et al. claim that role-based access control (RBAC) for the mobile and ubiquitous computing environment needs further constraints, such as a relative distance (proximity) of two roles, in allowing access to resources. For instance...
|
Aug 22 2014 |
|
|
Consistency and enforcement of access rules in cooperative data sharing environment Le M., Kant K., Jajodia S. Computers and Security 413-18, 2014. Type: Article
Modern businesses require online multipart collaboration to efficiently service their clients, and this requirement forces them to allow collaborating businesses to access their data. The immediate consequence is that the collaborating...
|
Jul 15 2014 |
|
|
Crypto management made manageable--demands on crypto equipment design Fåk V. Computers and Security 6(1): 36-40, 1987. Type: Article
Increased security consciousness in most large organizations has brought on an increase in the use of encryption; and crypto management is, indeed, possible in a normal computer environment. In some instances, such as protecting files ...
|
Feb 1 1988 |
|
|
A pauper’s callback scheme Bishop M. Computers and Security 5(2): 141-144, 1986. Type: Article
This short paper contains two sections. The first suggests that a callback modem can be replaced by a program in which a caller can specify the phone number to be called. This seems to defeat the very purpose of callback modems, howeve...
|
Mar 1 1987 |
|
|
On the key storage requirements for secure terminals Jansen C. Computers and Security 5(2): 145-149, 1986. Type: Article
The author of this paper is employed by Philips Usfa in the development of cryptographic equipment. As a consequence, he is appropriately equipped to present some deliberations on practical encryption applications....
|
Mar 1 1987 |
|
|
Data security in a relational database environment van der Lans R. Computers and Security 5(2): 128-134, 1986. Type: Article
The paper provides an introduction to the data security features offered by the relational database language SQL: checking, granting, passing, and revoking authorities, as well as recovery and looking....
|
Feb 1 1987 |
|
|
Risk management--a key to security in the electronic funds transfer system Richards R., Yestingsmeier J. Computers and Security 5(2): 135-140, 1986. Type: Article
This is a short summary which mentions once almost every topic related to EFTS security management. Since so many topics are mentioned in so few pages (including insurance, consumer protection, auditing, etc.), none can be cover...
|
Jan 1 1987 |
|
|
Microcomputer security: data protection techniques Highland H. (ed) Computers and Security 4(2): 123-134, 1985. Type: Article
This paper provides a shallow look into the world of data security on microcomputers. The author touches on seven areas of data security, giving a brief description of each area, as well as a description of the commercially available h...
|
Apr 1 1986 |
|
|
Incorporating access control in forms systems Yeo G. Computers and Security 4(2): 109-122, 1985. Type: Article
Many current computer systems work on the basis of forms for input and output. Many of these systems have elaborate editing languages to allow the programmer to specify the structure of the form, and the format of the fields. The autho...
|
Feb 1 1986 |
|
|
Data security and confidentiality in Europe Chamoux J. Computers and Security 4(3): 207-210, 1985. Type: Article
This brief paper is presumably a critical review of the findings of a European Economic Community study of data security and confidentiality. However, the author does not cite any report or document containing the findings. According t...
|
Feb 1 1986 |
|
|
|
|
|
|
|
|