Please use this identifier to cite or link to this item: https://hdl.handle.net/1959.11/1012
Full metadata record
DC FieldValueLanguage
dc.contributor.authorEvered, MPen
dc.contributor.authorBogeholz, SFen
local.source.editorEditor(s): Hogan, J, Montague, P, Purvis, M, Steketee, Cen
dc.date.accessioned2008-09-25T11:49:00Z-
dc.date.issued2004-
dc.identifier.citationProceedings of the Second Australasian Information Security Workshop (AISW2004) - Conferences in Research and Practice in Information Technology, Vol. 32, p. 53-61en
dc.identifier.isbn1920682147en
dc.identifier.urihttps://hdl.handle.net/1959.11/1012-
dc.description.abstractWe present a detailed examination of the access constraints for a small real-world Health Information System with the aim of achieving minimal access rights for each of the involved principals. We show that, even for such a relatively simple system, the resulting constraints are very complex and cannot be expressed easily or clearly using the static per-method access control lists generally supported by component-based software. We derive general requirements for the expressiveness of access constraints and propose criteria for a more suitable access control mechanism in the context of component-based systems. We describe a two-level mechanism which can fulfil these criteria.en
dc.languageenen
dc.publisherAustralian Computer Society (ACS)en
dc.relation.ispartofProceedings of the Second Australasian Information Security Workshop (AISW2004) - Conferences in Research and Practice in Information Technology, Vol. 32en
dc.titleA Case Study in Access Control Requirements for a Health Information Systemen
dc.typeConference Publicationen
dc.relation.conferenceAISW 2004: Second Australasian Information Security Workshopen
dc.subject.keywordsComputer Softwareen
local.contributor.firstnameMPen
local.contributor.firstnameSFen
local.subject.for2008080399 Computer Software not elsewhere classifieden
local.subject.seo700102 Application tools and system utilitiesen
local.profile.schoolSchool of Science and Technologyen
local.profile.schoolSchool of Educationen
local.profile.emailmevered@une.edu.auen
local.profile.emailsbogeho2@une.edu.auen
local.output.categoryE1en
local.record.placeauen
local.record.institutionUniversity of New Englanden
local.identifier.epublicationsrecordpes:1792en
local.date.conference31st January, 2004en
local.conference.placeDunedin, New Zealanden
local.publisher.placeDunedin, New Zealanden
local.format.startpage53en
local.format.endpage61en
local.peerreviewedYesen
local.contributor.lastnameEvereden
local.contributor.lastnameBogeholzen
dc.identifier.staffune-id:mevereden
dc.identifier.staffune-id:sbogeho2en
local.profile.roleauthoren
local.profile.roleauthoren
local.identifier.unepublicationidune:1031en
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
local.title.maintitleA Case Study in Access Control Requirements for a Health Information Systemen
local.output.categorydescriptionE1 Refereed Scholarly Conference Publicationen
local.relation.urlhttp://www.cis.unisa.edu.au/aisw04/en
local.relation.urlhttp://portal.acm.org/citation.cfm?id=976447en
local.relation.urlhttp://crpit.com/confpapers/CRPITV32Evered.pdfen
local.conference.detailsAISW 2004: Second Australasian Information Security Workshop, Dunedin, New Zealand, January, 2004en
local.search.authorEvered, MPen
local.search.authorBogeholz, SFen
local.uneassociationUnknownen
local.year.published2004en
local.date.start2004-01-31-
Appears in Collections:Conference Publication
Files in This Item:
2 files
File Description SizeFormat 
Show simple item record

Page view(s)

1,164
checked on Sep 22, 2024
Google Media

Google ScholarTM

Check


Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.