Pinning down a security policy for mobile data
β Scribed by Terry Ernest-Jones
- Publisher
- Elsevier Science
- Year
- 2006
- Tongue
- English
- Weight
- 92 KB
- Volume
- 2006
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
Consumer mobile phone security requires more attention, now that their data storage capacity is increasing. At the same time, much effort is spent on data-centric security for large enterprises. In this article we try to apply data-centric security to consumer mobile phones. We show a maturity model
In this paper, the need for identifying and analyzing the generic security characteristics of a healthcare information system is, first, demonstrated. The analysis of these characteristics is based upon a decision-support roadmap. The results from this profiling work are then analyzed in the light
In this paper, the approaches to introducing security policy into Role-Based Access Control (RBAC) and the Common Data Security Architecture (CDSA) are proposed. We apply security policy to a role's privileges in RBAC. An extended RBAC using PKI and roleassignment policy is described. The improved C