loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Jim Longstaff ; Mike Lockyer ; Tony Howitt and Ian Elcoate

Affiliation: University of Teesside, United Kingdom

Keyword(s): Access Contol, Authorisation Models.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Data Engineering ; Data Privacy and Security ; Databases and Data Security ; e-Commerce Security and Reliability Issues ; Information and Systems Security

Abstract: We present the principles of permissions processing used in the Tees Confidentiality Model (TCM), ageneral authorisation model which is suitable for complex web applications in addition to computer systems administration. In particular, we present new techniques for authorising by multiple concepts, and also for overriding access restrictions. A database implementation of the TCM is referred to, which can be used to provide the basis for a general authorisation service. The TCM is an extension of Role-Based Access Control (RBAC), and has had a significant impact on the development of healthcare computing in the UK. A demanding scenario from Electronic Health Records is used to illustrate the permissions processing and the power of the model.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.219.236.62

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Longstaff, J.; Lockyer, M.; Howitt, T. and Elcoate, I. (2005). A GENERAL MODEL OF AUTHORISATION FOR COMPLEX COMPUTING APPLICATIONS. In Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE; ISBN 972-8865-32-5; ISSN 2184-3236, SciTePress, pages 74-79. DOI: 10.5220/0001421200740079

@conference{icete05,
author={Jim Longstaff. and Mike Lockyer. and Tony Howitt. and Ian Elcoate.},
title={A GENERAL MODEL OF AUTHORISATION FOR COMPLEX COMPUTING APPLICATIONS},
booktitle={Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE},
year={2005},
pages={74-79},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001421200740079},
isbn={972-8865-32-5},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE
TI - A GENERAL MODEL OF AUTHORISATION FOR COMPLEX COMPUTING APPLICATIONS
SN - 972-8865-32-5
IS - 2184-3236
AU - Longstaff, J.
AU - Lockyer, M.
AU - Howitt, T.
AU - Elcoate, I.
PY - 2005
SP - 74
EP - 79
DO - 10.5220/0001421200740079
PB - SciTePress