E-Business Data Access Authorizing Architecture By Applying Trusting Policies
E-Business Data Access Authorizing Architecture By Applying Trusting Policies
Author(s): Laura DanilescuSubject(s): Economy
Published by: Editura Universitară Danubius
Keywords: policies; trust; hierarchies; algorithm; tuples; TAP architecture
Summary/Abstract: A large number of organizations have implemented security or privacy policies through classified documents. However, this does not resolve a unitary information within the organization and does not complete disclosure of confidential data, according to the hierarchical level that a person occupies. For this reason, have been defined policies to control access to information based on hierarchies and relations of trust. Policy generation is performed using algorithms and their enforcement through an XML-based language.
Journal: Euro Economica
- Issue Year: 28/2011
- Issue No: 02
- Page Range: 73-77
- Page Count: 5