F. A. Alsulaiman, A. Miège, Abdulmotaleb El Saddik
{"title":"基于阈值的协同访问控制(T-CAC)","authors":"F. A. Alsulaiman, A. Miège, Abdulmotaleb El Saddik","doi":"10.1109/CTS.2007.4621737","DOIUrl":null,"url":null,"abstract":"Userpsilas information confidentiality and privacy rise with the increased usage of computers by various organizations. Abuse of privileges might occur when the trust is based on a single person. Moreover, access control models usually consider only regular policies and are not appropriate to unusual or exceptional circumstances. For instance, in case of emergencies many users might override the access control system in order to access unauthorized sensitive data which is undesirable.","PeriodicalId":363805,"journal":{"name":"2007 International Symposium on Collaborative Technologies and Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Threshold-based Collaborative Access Control (T-CAC)\",\"authors\":\"F. A. Alsulaiman, A. Miège, Abdulmotaleb El Saddik\",\"doi\":\"10.1109/CTS.2007.4621737\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Userpsilas information confidentiality and privacy rise with the increased usage of computers by various organizations. Abuse of privileges might occur when the trust is based on a single person. Moreover, access control models usually consider only regular policies and are not appropriate to unusual or exceptional circumstances. For instance, in case of emergencies many users might override the access control system in order to access unauthorized sensitive data which is undesirable.\",\"PeriodicalId\":363805,\"journal\":{\"name\":\"2007 International Symposium on Collaborative Technologies and Systems\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-05-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 International Symposium on Collaborative Technologies and Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CTS.2007.4621737\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Symposium on Collaborative Technologies and Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CTS.2007.4621737","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Threshold-based Collaborative Access Control (T-CAC)
Userpsilas information confidentiality and privacy rise with the increased usage of computers by various organizations. Abuse of privileges might occur when the trust is based on a single person. Moreover, access control models usually consider only regular policies and are not appropriate to unusual or exceptional circumstances. For instance, in case of emergencies many users might override the access control system in order to access unauthorized sensitive data which is undesirable.