loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Jim Longstaff ; Mike Lockyer ; Tony Howitt and Ian Elcoate

Affiliation: University of Teesside, United Kingdom

ISBN: 972-8865-32-5

Keyword(s): Access Contol, Authorisation Models.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Data Engineering ; Data Privacy and Security ; Databases and Data Security ; e-Commerce Security and Reliability Issues ; Information and Systems Security

Abstract: We present the principles of permissions processing used in the Tees Confidentiality Model (TCM), ageneral authorisation model which is suitable for complex web applications in addition to computer systems administration. In particular, we present new techniques for authorising by multiple concepts, and also for overriding access restrictions. A database implementation of the TCM is referred to, which can be used to provide the basis for a general authorisation service. The TCM is an extension of Role-Based Access Control (RBAC), and has had a significant impact on the development of healthcare computing in the UK. A demanding scenario from Electronic Health Records is used to illustrate the permissions processing and the power of the model.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.227.240.143

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Longstaff J.; Lockyer M.; Howitt T.; Elcoate I. and (2005). A GENERAL MODEL OF AUTHORISATION FOR COMPLEX COMPUTING APPLICATIONS.In Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE, ISBN 972-8865-32-5, pages 74-79. DOI: 10.5220/0001421200740079

@conference{icete05,
author={Jim Longstaff and Mike Lockyer and Tony Howitt and Ian Elcoate},
title={A GENERAL MODEL OF AUTHORISATION FOR COMPLEX COMPUTING APPLICATIONS},
booktitle={Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE,},
year={2005},
pages={74-79},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001421200740079},
isbn={972-8865-32-5},
}

TY - CONF

JO - Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE,
TI - A GENERAL MODEL OF AUTHORISATION FOR COMPLEX COMPUTING APPLICATIONS
SN - 972-8865-32-5
AU - Longstaff, J.
AU - Lockyer, M.
AU - Howitt, T.
AU - Elcoate, I.
PY - 2005
SP - 74
EP - 79
DO - 10.5220/0001421200740079

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.