E-Business Data Access Authorizing Architecture By Applying Trusting Policies
A large number of organizations have implemented security or privacy policies through classified documents. However, this does not resolve a unitary information within the organization and does not complete disclosure of confidential data, according to the hierarchical level that a person occupies. For this reason, have been defined policies to control access to information based on hierarchies and relations of trust. Policy generation is performed using algorithms and their enforcement through an XML-based language.
When requesting a correction, please mention this item's handle: RePEc:dug:journl:y:2011:i:28:p:73-77. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Florian Nuta)
If references are entirely missing, you can add them using this form.