𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Pinning down a security policy for mobile data

✍ Scribed by Terry Ernest-Jones


Publisher
Elsevier Science
Year
2006
Tongue
English
Weight
92 KB
Volume
2006
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Future consumer mobile phone security: A
✍ AndrΓ© van Cleeff πŸ“‚ Article πŸ“… 2008 πŸ› Elsevier Science 🌐 English βš– 250 KB

Consumer mobile phone security requires more attention, now that their data storage capacity is increasing. At the same time, much effort is spent on data-centric security for large enterprises. In this article we try to apply data-centric security to consumer mobile phones. We show a maturity model

A baseline security policy for distribut
✍ Dimitris Gritzalis πŸ“‚ Article πŸ“… 1997 πŸ› Elsevier Science 🌐 English βš– 995 KB

In this paper, the need for identifying and analyzing the generic security characteristics of a healthcare information system is, first, demonstrated. The analysis of these characteristics is based upon a decision-support roadmap. The results from this profiling work are then analyzed in the light

The application of security policy to ro
✍ A Lin; R Brown πŸ“‚ Article πŸ“… 2000 πŸ› Elsevier Science 🌐 English βš– 307 KB

In this paper, the approaches to introducing security policy into Role-Based Access Control (RBAC) and the Common Data Security Architecture (CDSA) are proposed. We apply security policy to a role's privileges in RBAC. An extended RBAC using PKI and roleassignment policy is described. The improved C