A Location-based Secure Access Control Mechanism for Geospatial Data
نویسندگان
چکیده
منابع مشابه
A Location-based Secure Access Control Mechanism for Geospatial Data
Nowadays due to the advancements in spatial data acquisition technologies, data acquisition technologies are producing mass high precision spatial data. To store such high precision data onto the database is a big challenge today. Spatial database is different from relational database as it contains data along with its location, so security concerns of spatial database are also different from r...
متن کاملA Secure Access Control Mechanism against Internet Crackers
Internet servers are always in danger of being “hijacked” by various attacks like the buffer overflow attack. To minimize damages in cases where full control of the servers are stolen, imposing access restrictions on the servers is still needed. However, designing a secure access control mechanism against hijacking is not easy because that mechanism itself can be a security hole. In this paper,...
متن کاملPlayful Geospatial Data Acquisition by Location-based Gaming Communities
The success of Web 2.0 communities demonstrates that the users of an information service are willing to participate in the content creation process on a voluntary basis. In this paper we adapt this idea to the task of collecting geographic data by player communities of location-based games. We identify three types of geographic data that players can collect as part of the game experience: (1) d...
متن کاملSecure Access Mechanism for Cloud Storage
Emerging storage cloud systems provide continuously available and highly scalable storage services to millions of geographically distributed clients. A secure access control mechanism is a crucial prerequisite for allowing clients to entrust their data to such cloud services. The seamlessly unlimited scale of the cloud and the new usage scenarios that accompany it pose new challenges in the des...
متن کاملA Secure Access Control Mechanism Web Service-based in Extended Organization PKI Networks
Organizations use PKI (Public Key Infrastructures) to support internal business processes, but some businesses have industrial partnerships with others, and these alliances can exploit B2B (Business to Business) e-commerce capabilities by connecting corporate PKI. The paper deals with two methods to realize access control in extended organization PKI business processes: BCAs (Bridge Certificati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2013
ISSN: 0975-8887
DOI: 10.5120/13787-1868