Poster: Unified Access Control for Surgical Robotics
References
Index Terms
- Poster: Unified Access Control for Surgical Robotics
Recommendations
On Mutual Support of Modern and Traditional Access Control Models with UCON and BLP as Case Study
CMC '11: Proceedings of the 2011 Third International Conference on Communications and Mobile ComputingAccess control is essential to computer security, especially in an open, distributed, networked communication environment. Modern access control model such as UCON aims at accommodating general requirements. Traditional one such as BLP focuses on ...
PBDM: a flexible delegation model in RBAC
SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologiesRole-based access control (RBAC) is recognized as an efficient access control model for large organizations. Most organizations have some business rules related to access control policy. Delegation of authority is among these rules. RBDM0 and RDM2000 ...
A Context-Aware Mandatory Access Control Model for Multilevel Security Environments
SAFECOMP '08: Proceedings of the 27th international conference on Computer Safety, Reliability, and SecurityMandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments like military domains. In traditional mandatory models, the security classes associated with entities are context-...
Comments
Information & Contributors
Information
Published In
- General Chair:
- Florian Kerschbaum,
- Program Chairs:
- Atefeh Mashatan,
- Jianwei Niu,
- Adam J. Lee
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Poster
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 101Total Downloads
- Downloads (Last 12 months)4
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in