Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/1012
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Evered, MP | en |
dc.contributor.author | Bogeholz, SF | en |
local.source.editor | Editor(s): Hogan, J, Montague, P, Purvis, M, Steketee, C | en |
dc.date.accessioned | 2008-09-25T11:49:00Z | - |
dc.date.issued | 2004 | - |
dc.identifier.citation | Proceedings of the Second Australasian Information Security Workshop (AISW2004) - Conferences in Research and Practice in Information Technology, Vol. 32, p. 53-61 | en |
dc.identifier.isbn | 1920682147 | en |
dc.identifier.uri | https://hdl.handle.net/1959.11/1012 | - |
dc.description.abstract | We present a detailed examination of the access constraints for a small real-world Health Information System with the aim of achieving minimal access rights for each of the involved principals. We show that, even for such a relatively simple system, the resulting constraints are very complex and cannot be expressed easily or clearly using the static per-method access control lists generally supported by component-based software. We derive general requirements for the expressiveness of access constraints and propose criteria for a more suitable access control mechanism in the context of component-based systems. We describe a two-level mechanism which can fulfil these criteria. | en |
dc.language | en | en |
dc.publisher | Australian Computer Society (ACS) | en |
dc.relation.ispartof | Proceedings of the Second Australasian Information Security Workshop (AISW2004) - Conferences in Research and Practice in Information Technology, Vol. 32 | en |
dc.title | A Case Study in Access Control Requirements for a Health Information System | en |
dc.type | Conference Publication | en |
dc.relation.conference | AISW 2004: Second Australasian Information Security Workshop | en |
dc.subject.keywords | Computer Software | en |
local.contributor.firstname | MP | en |
local.contributor.firstname | SF | en |
local.subject.for2008 | 080399 Computer Software not elsewhere classified | en |
local.subject.seo | 700102 Application tools and system utilities | en |
local.profile.school | School of Science and Technology | en |
local.profile.school | School of Education | en |
local.profile.email | mevered@une.edu.au | en |
local.profile.email | sbogeho2@une.edu.au | en |
local.output.category | E1 | en |
local.record.place | au | en |
local.record.institution | University of New England | en |
local.identifier.epublicationsrecord | pes:1792 | en |
local.date.conference | 31st January, 2004 | en |
local.conference.place | Dunedin, New Zealand | en |
local.publisher.place | Dunedin, New Zealand | en |
local.format.startpage | 53 | en |
local.format.endpage | 61 | en |
local.peerreviewed | Yes | en |
local.contributor.lastname | Evered | en |
local.contributor.lastname | Bogeholz | en |
dc.identifier.staff | une-id:mevered | en |
dc.identifier.staff | une-id:sbogeho2 | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.identifier.unepublicationid | une:1031 | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
local.title.maintitle | A Case Study in Access Control Requirements for a Health Information System | en |
local.output.categorydescription | E1 Refereed Scholarly Conference Publication | en |
local.relation.url | http://www.cis.unisa.edu.au/aisw04/ | en |
local.relation.url | http://portal.acm.org/citation.cfm?id=976447 | en |
local.relation.url | http://crpit.com/confpapers/CRPITV32Evered.pdf | en |
local.conference.details | AISW 2004: Second Australasian Information Security Workshop, Dunedin, New Zealand, January, 2004 | en |
local.search.author | Evered, MP | en |
local.search.author | Bogeholz, SF | en |
local.uneassociation | Unknown | en |
local.year.published | 2004 | en |
local.date.start | 2004-01-31 | - |
Appears in Collections: | Conference Publication |
Files in This Item:
File | Description | Size | Format |
---|
Page view(s)
1,178
checked on Dec 29, 2024
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.