AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
نویسندگان
چکیده
منابع مشابه
Access Control Policy Management
Wang, Qihua. Ph.D., Purdue University, May 2009. Access Control Policy Management. Major Professor: Ninghui Li. Access control is the traditional center of gravity of computer security [1]. People specify access control policies to control accesses to resources in computer systems. The management of access control policies include policy specification and policy analysis. In this dissertation, ...
متن کاملLogic-Based Access Control Policy Specification and Management
Recently there has been a great amount of attention to access control languages that can cover large, open, distributed and heterogeneous environments like the Web. These languages aim to be flexible and extensible, with enough features to capture expressive and distributed security policies. However, with expressive languages such as XACML or WS-Policy, users have problems understanding the ov...
متن کاملIPv6 Traceback Using Policy Based Management System
Most of the cyber attacks use spoofed IP packets to cast an attack. The stateless nature of IP makes it nearly impossible to identify the true source(s) of these attacks. With the help of IP traceback techniques, we try to identifying the true source of an IP datagram in Internet. While many IP traceback techniques have been proposed, but most of the previous studies focus and offer solutions f...
متن کاملA Policy-Based Dialogue System for Physical Access Control
We prototype a policy-based dialog system for providing physical access control to secured facilities and smart buildings. In our prototype system, physical access control policies are specified using the eXtensible Access Control Markup Language. Based on the policy and the user’s presence information, our dialog system automatically produces a series of questions and answers that, if correctl...
متن کاملOptimisation of Policy-based Internet Routing Using Access Control Lists
This paper considers an optimisation problem encountered in the implementation of traffic policies on network routers. The problem is formulated and shown to be NP-complete. Exact and heuristic solution methods are introduced and compared and computational results given. Additional complications and extensions are considered in conclusion.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications Technology and Research
سال: 2014
ISSN: 2319-8656
DOI: 10.7753/ijcatr0304.1003