نتایج جستجو برای: access control policies

تعداد نتایج: 1702974  

2013
M. Ramalingam R. M. S. Parvathi

A semantic access control mechanism is used to provide access permission to the authorized users. Some access control models think about the rich semantic relations between the requested and the availing services. They will not filter out the services that do not met both the service providers’ policies as well as the users’ policies, because they offer only coarse-grained access. To solve this...

2008
Daisy Daiqin He Michael Compton Kerry Taylor Jian Yang

Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and challenging security issues concerning collaboration in the context of service oriented computing (SOC) have arisen due to the dynamic and loosely coupled nature of the environment in which these collaborations are con...

2012
Sarah Nait Bahloul Emmanuel Coquery Mohand-Said Hacid

In this paper, we propose a novel approach to facilitate the administration of access control policies to ensure the confidentiality of data at the level of materialized views. A materialized view stores both the definition of the view and the rows resulting from the execution of the view. Several techniques and models have been proposed to control access to databases, but to our knowledge the ...

2003
Gerome Miklau Dan Suciu

We propose a framework for enforcing access control policies on published XML documents using cryptography. In this framework the owner publishes a single data instance, which is partially encrypted, and which enforces all access control policies. Our contributions include a declarative language for access policies, and the resolution of these policies into a logical “protection model” which pr...

2017
Damiano Di Francesco Maesa Paolo Mori Laura Ricci

Access Control systems are used in computer security to regulate the access to critical or valuable resources. The rights of subjects to access such resources are typically expressed through access control policies, which are evaluated at access request time against the current access context. This paper proposes a new approach based on blockchain technology to publish the policies expressing t...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

1998
Mark R. Heckman Karl N. Levitt

This paper describes how the composition principle of Abadi and Lamport can be applied to specify and compose systems where access control policies are distributed among a hierarchy of agents. Examples of such systems are layered secure operating systems, where the mandatory access control policy is enforced by the lowest system layer and discretionary and application-speciic policies are imple...

2005
Teng Lv Ping Yan Zhenxing Wang

This paper analyzes the most common security problems of web application level. A model WALSG (Web Application Level Security Gateway) is presented to provide web application level security. WALSG employs XML Schema to specify access control policies and security policies for HTML pages and cookies. WALSG can also be used as a secure tool to define access control policies and security policies ...

2007
Rafae Bhatti Maria Luisa Damiani David W. Bettis Elisa Bertino

An important issue in mobile computing systems is the administration of locationbased access control policies, particularly the mechanism for specification and enforcement of spatial constraints. Simplifying the administration of such policies requires a mechanism that supports both an intuitive and scalable spatial constraint specification and a flexible enforcement architecture. In this paper...

2016
Jamie Payton Christine Julien

The emerging mobile computing environment draws new attention to the need for coordination among networked components. The very nature of this environment requires parties to interact even when they have never met before, and subsequent encounters are totally unpredictable. Because mobile networks are often decoupled from any fixed network infrastructure, reliance on centralized servers to auth...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید