The formulary model for flexible privacy and access controls

26Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

We have defined and demonstrated a model of access control which allows real-time decisions to be made about privileges granted to users of a data base. Raw data need appear only once in the data base and arbitrarily complex access control programs can be associated with arbitrarily small fragments of this data. The desirable characteristics for an access control method laid out in the section on access control methods are all present (though we have not yet run enough experiments to make general statements about efficiency): (1) No arbitrary constraint (such as segmentation or sensitivity levels) is imposed on data or programs. (2) The method allows control of individual data elements. Its efficiency depends on the specific system involved and the particular controls used. (3) No extra storage or time is required to describe data which the user does not desire to protect. (4) The method is machine-independent and also independent of file structure. The efficiency of each implementation depends mainly on the adequacy of the formulary method for the particular data structures and application involved. (5) The discussion above illustrates the modularity of the formulary mode.

Cite

CITATION STYLE

APA

Hoffman, L. J. (1971). The formulary model for flexible privacy and access controls. In AFIPS Conference Proceedings - 1971 Fall Joint Computer Conference, AFIPS 1971 (pp. 587–601). Association for Computing Machinery, Inc. https://doi.org/10.1145/1479064.1479168

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free