Translating Role-Based Access Control Policy within Context

@inproceedings{Bacon2001TranslatingRA,
  title={Translating Role-Based Access Control Policy within Context},
  author={Jean Bacon and Michael Lloyd and Ken Moody},
  booktitle={POLICY},
  year={2001}
}
The motivation for this work derives from a study undertaken with a view to providing ubiquitous access to Electronic Health Records (EHRs) held within the National Health Service in England. Any implementation must guarantee confidentiality. In October 1999 the Cambridge Computer Laboratory's Opera group joined a consortium within the Eastern Regional Health Authority to propose an experimental architecture which included role-based access control (RBAC). Specifying a policy for role-based… CONTINUE READING

Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 29 CITATIONS

Data and Application Security

  • IFIP International Federation for Information Processing
  • 2001
VIEW 14 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Integration of Access Control Requirements into System Specifications

VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

A Domain-Role-Based Control Model for CSCW System

  • 2009 International Conference on Management and Service Science
  • 2009
VIEW 2 EXCERPTS
CITES BACKGROUND

Policy Management across Multiple Platforms and Application Domains

  • 2008 IEEE Workshop on Policies for Distributed Systems and Networks
  • 2008
VIEW 1 EXCERPT
CITES BACKGROUND

Domain-Based Access Control for Collaborative E- Commerce System

  • 2007 2nd International Conference on Pervasive Computing and Applications
  • 2007
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 12 REFERENCES

An Ar hite ture for Distributed OASIS Servi es Pro eedings Middleware 2000, Le ture Notes in Computer S ien e, Vol

J. H. Hine, W. Yao, J. Ba on, K. Moody
  • 1795. Springer-Verlag, Berlin, Heidelberg and New York.
  • 2000
VIEW 1 EXCERPT

Conversion of NHS A ess Control Poli y to Formal Logi

M. Lloyd
  • MPhil in Computer Spee h and Language Pro essing, University of Cambridge,
  • 2000

Generi Support for Asyn hronous, Se ure Distributed Appli ations

J. Ba on, K. Moody, +5 authors M. Spi teri
  • IEEE Computer Vol. 33(3)
  • 2000

Attempto Controlled English - Not Just Another Logi Spe i ation Language

N. E. Fu hs, U. S hwertel, R. S hwitter
  • Le ture Notes in Computer S ien e, Vol
  • 1999

Controlled Natural Language Can Re pla e First-Order Logi

N. E. Fu hs, U. S hwertel, S. Torge
  • Pro eedings 14th IEEE International Conferen e on Au tomated Software Engineering, IEEE Computer So iety Press,
  • 1999

Priva y in lini al information systems in se ondary are

I. Denley, S. Weston Smith
  • British Medi al Journal 318
  • 1999

COBEA: A CORBA-based Event Ar hite ture

C. Ma, J. Ba on
  • In Pro eed ings of the 4th Conferen e on Obje t-Oriented Te hnologies and Systems (COOTS 98), USENIX Asso iation, Berkeley,
  • 1998

OASIS: A ess Control in an Open, Dis tributed Environment

R. Hayton, J. Ba on, K. Moody
  • Pro eedings IEEE Symposium on Se urity and Priva y. IEEE CS Press, Los Alamitos, Calif.
  • 1998

Separation of duty in role-based environments

  • Proceedings 10th Computer Security Foundations Workshop
  • 1997