5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011) 2011
DOI: 10.1109/dest.2011.5936606
|View full text |Cite
|
Sign up to set email alerts
|

Visual access control for research ecosystems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2012
2012
2014
2014

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…Such a strategy may be of use in PACVIM, because it is difficult for a user to mentally keep track of the topology of his/her constantly changing healthcare EHR network. Other works propose visual languages for specifying role based access control rules for web systems [22], or describe visual approaches to manage access control for distributed research ecosystems based on a multi-purpose collaborative graph structure [23]. Individuals are enabled to visually interact with the graph and contribute to access control decisions by jointly modelling the environment's structures and policies.…”
Section: Related Workmentioning
confidence: 99%
“…Such a strategy may be of use in PACVIM, because it is difficult for a user to mentally keep track of the topology of his/her constantly changing healthcare EHR network. Other works propose visual languages for specifying role based access control rules for web systems [22], or describe visual approaches to manage access control for distributed research ecosystems based on a multi-purpose collaborative graph structure [23]. Individuals are enabled to visually interact with the graph and contribute to access control decisions by jointly modelling the environment's structures and policies.…”
Section: Related Workmentioning
confidence: 99%
“…• role-organizational unit relation: relationships between roles and organizational units. In contrast to other approaches (e.g., [10], [12], [29]) which also represent users as nodes in the visualization, users are presented in alphabetically order as list in another view. This design decision helps to reduce the number of the visualized links between the nodes.…”
Section: A Basic Structurementioning
confidence: 99%
“…For the visualization of the organizational structure and assignments (e.g., users to roles or permissions to roles) in access control systems, primarily node-link representations are used (see e.g., [4], [10], [12], [14], [29]). For example, Harbach and Smith [29] present an approach -called Mind Mesh -which is inspired by the Mind Maps approach [36] to present organizational information like departments/groups, their projects, users, and resources as nodes and their relationships as links. Furthermore, there exist several works that use the well-known node-link diagrams of the Unified Modeling Language (UML) to visualize the specification of the access control models (see e.g., [5], [37], [38], [39], [40]).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Medical staff would benefit from time-saving workflows while strict privacy policies for medical data could be automatically adhered to. In [10], we introduced a new visual AC concept for research ecosystems, called Mind Mesh. It proposes to model access privileges visually and uses context information for access control configurations.…”
Section: Introductionmentioning
confidence: 99%