Correction to: Enforcing fine-grained access control for secure collaborative modelling using bidirectional transformations
نویسندگان
چکیده
منابع مشابه
Towards Secure Cloud Database with Fine-Grained Access Control
Outsourcing data to cloud environments can offer ease of access, provisioning, and cost benefits, but makes the data more vulnerable to disclosure. Loss of complete control over the data can be offset through encryption, but this approach requires an omniscient third party key authority to handle key management, increasing overhead complexity. We present the ZeroVis framework that provides conf...
متن کاملSecure platforms for enforcing contextual access control
Gupta, Aditi Ph.D., Purdue University, December 2014. Secure Platforms for Enforcing Contextual Access Control. Major Professor: Elisa Bertino. Advances in technology and wide scale deployment of networking enabled portable devices such as smartphones has made it possible to provide pervasive access to sensitive data to authorized individuals from any location. While this has certainly made dat...
متن کاملOn Fine-Grained Access Control for XML
Fine-grained access control for XML is about controlling access to XML documents at the granularity of individual elements or attributes. This thesis addresses two problems related to XML access controls. The first is efficient, secure evaluation of XPath expressions. We present a technique that secures path expressions by means of query modification, and we show that the query modification alg...
متن کاملA Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications
Access control is a system-wide concern that has both a generic nature and an application dependent characteristic. It is generic as many functions must be protected with restricted access, yet the rule to grant a request is highly dependent on the application state. Hence it is common to see the code for implementing access control scattered over the system and tangled with the functional code...
متن کاملFine-grained Access Control for Mobile Platforms
With the introduction of the smartphone, mobile phones have gone from closed systems with limited capability to mobile software platforms with rich software ecosystems. The same operating systems are now present in other mobile devices as well, such as tablets. The security mechanism of such software platforms have, apart from end-user requirements, heavily been influenced by business and legis...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Software & Systems Modeling
سال: 2018
ISSN: 1619-1366,1619-1374
DOI: 10.1007/s10270-017-0650-5