Securing personal information

作者: Philippe Stransky-Heilkron

DOI:

关键词:

摘要: A database containing personal information of a user can be selectively read from and written to by multiple entities. Access level rules determine who gets access which entries record in the database. some actions taken on may possible only producing, real time, smartcard-based authorization for such or actions.

参考文章(12)
George R. Dicker, Scott M. Herz, Timothy S. Hurley, Ahmer A. Khan, Christopher Sharp, Anton K. Diederich, Online payments using a secure element of an electronic device ,(2014)
Mary A. Galindo, Jean-Paul Champagne, Patricia A. Stange, Donna R. Hickman, Jerome D. Hudson, Cynthia M. K. Hickerson, Robert P. Lockhart, Nancy B. Saddler, System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential ,(1996)
Brian Michael Unitt, Yashvant Kanabar, Daniel Vincent McCaughan, Robert John Dean, Multi-view personalized communications agent ,(1997)
Lev Novik, Irena Hudis, Sameet H. Agarwal, Sanjay Anand, Balan Sethu Raman, Zone based security administration for data items ,(2004)
Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner, Efficient inference control for open relational queries DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy. pp. 162- 176 ,(2010) , 10.1007/978-3-642-13739-6_11
Takashi Yoshioka, Bintatsu Noda, Masahiko Takenaka, Souichi Okada, Method, apparatus, and computer program for managing access to documents ,(2006)