EuroEconomica, Vol 28, No 2 (2011)

E-Business Data Access Authorizing Architecture By Applying Trusting Policies

Laura Danilescu


A large number of organizations have implemented security or privacy policies through classified documents. However, this does not resolve a unitary information within the organization and does not complete disclosure of confidential data, according to the hierarchical level that a person occupies. For this reason, have been defined policies to control access to information based on hierarchies and relations of trust. Policy generation is performed using algorithms and their enforcement through an XML-based language.


Full Text: PDF


  • There are currently no refbacks.
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.