E-Business Data Access Authorizing Architecture By Applying Trusting Policies Cover Image

E-Business Data Access Authorizing Architecture By Applying Trusting Policies
E-Business Data Access Authorizing Architecture By Applying Trusting Policies

Author(s): Laura Danilescu
Subject(s): Economy
Published by: Editura Universitară Danubius
Keywords: policies; trust; hierarchies; algorithm; tuples; TAP architecture

Summary/Abstract: A large number of organizations have implemented security or privacy policies through classified documents. However, this does not resolve a unitary information within the organization and does not complete disclosure of confidential data, according to the hierarchical level that a person occupies. For this reason, have been defined policies to control access to information based on hierarchies and relations of trust. Policy generation is performed using algorithms and their enforcement through an XML-based language.

  • Issue Year: 28/2011
  • Issue No: 02
  • Page Range: 73-77
  • Page Count: 5
Toggle Accessibility Mode