Secure data access control with perception reasoning

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Location-based Secure Access Control Mechanism for Geospatial Data

Nowadays due to the advancements in spatial data acquisition technologies, data acquisition technologies are producing mass high precision spatial data. To store such high precision data onto the database is a big challenge today. Spatial database is different from relational database as it contains data along with its location, so security concerns of spatial database are also different from r...

متن کامل

Secure authorization, access control and data integrity in Bluetooth

The Bluetooth standard has a provision for mutual authentication of connecting devices but not their actual users and allows access control during connection setup only. We propose a user authorization and pairing (UAP) application, that has the ability to perform authentication and authorization of users using role based model. The pairing procedure, which exchanges link key between devices, i...

متن کامل

Secure Web Access Control Algorithm

The paper presents a flexible and efficient method to secure the access to a Web site implemented in PHP script language. The algorithm is based on the PHP’s session mechanism. The proposed method is a general one and offers the possibility to implement a PHP based secured access to a Web site, through a portal page and using an additional script included in any site’s page, which is required t...

متن کامل

A Logical Framework for Reasoning on Data Access Control Policies

In this paper we propose a logic formalism that naturally supports the encoding of complex security specifications. This formalism relies on a hierarchically structured domain made of subjects, objects and privileges. Authorizations are expressed by logic rules. The formalism supports both negation by failure (possibly unstratified) and true negation. The latter is used to express negative auth...

متن کامل

Secure SQL Server - Enabling Secure Access to Remote Relational Data

The Secure SQL Server – SecSS, is a technology primarily developed to enable self-­‐service governance of states, as described in (Paulin 2012). Self-­‐service governance is a novel model of governance that rejects service-­‐based public administration BLOCKIN

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal

سال: 2018

ISSN: 2255-2863

DOI: 10.14201/adcaij2018711328