An Access Control Hierarchy for Secure File Logging
نویسندگان
چکیده
Pervasive communication and forward-error correction have garnered minimal interest from both end-users and security experts in the last several years. Given the current status of unstable configurations, statisticians shockingly desire the deployment of extreme programming, which embodies the typical principles of algorithms. In order to answer this question, we concentrate our efforts on arguing that red-black trees and I/O automata can collude to answer this quagmire.
منابع مشابه
Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control
The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for ...
متن کاملSecure hierarchy-based access control in distributed environments
Access control is a fundamental concern in any system that manages resources, e.g., operating systems, file systems, databases and communications systems. The problem we address is how to specify, enforce, and implement access control in distributed environments. Starting from an access relation between users and resources, we derive a user hierarchy, a resource hierarchy, and a unified hierarc...
متن کاملA Performance Evaluation of Logging in XML Databases Using an Xlog File for Trust Based Access Control
Logging is an important process in databases and is used for recovery and security purposes. Logging in XML databases has rarely been discussed in the literature. In this paper the Xlog file is presented as a dynamic and temporary log file for XML databases. It is used, not for recovery, but to calculate user trust values by recording users’ bad transactions and errors. The novelty in this appr...
متن کاملThe CRISIS Wide Area Security Architecture
This paper presents the design and implementation of a new authentication and access control system, called CRISIS. A goal of CRISIS is to explore the systematic application of a number of design principles to building highly secure systems, including: redundancy to eliminate single points of attack, caching to improve performance and availability over slow and unreliable wide area networks, fi...
متن کاملA lightweight framework for secure life-logging in smart environments
As the world becomes an interconnected network where objects and humans interact with each other, new challenges and threats appear in the ecosystem. In this interconnected world, smart objects have an important role in giving users the chance for life-logging in smart environments. However, smart devices have several limitations with regards to memory, resources and computation power, hinderin...
متن کامل