Showing 1 - 3 of 3
As network capacity has increased over the past decade, individuals and organisations have found it increasingly appealing to make use of remote services in the form of service-oriented architectures and cloud computing services. Data processed by remote services, however, is no longer under the...
Persistent link: https://www.econbiz.de/10009438308
This article presents a survey of authorisation models and considers their ‘fitness-for-purpose’ in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities...
Persistent link: https://www.econbiz.de/10009438192
Authorised users (insiders) are behind the majority of security incidents with high financial impacts. Because authorisation is the process of controlling users? access to resources, improving authorisation techniques may mitigate the insider threat. Current approaches to authorisation suffer...
Persistent link: https://www.econbiz.de/10009483459