A Novel Access Control Model Based on the Structure of Applications
نویسندگان
چکیده
Nowadays, access control has an important role in the management of access to resources in the networks and applications. The establishment of access control in applications is important particularly. Traditional methods of access control, manage the users’ access only at data-centric level. In this paper a new model is presented in which the access control in applications is performed not only at data-centric level but also at component and plug-in levels. By applying the proposed model, the execution of plug-ins or components will be authorized only in the case of enrollment process and in the necessary authorities. In addition, users can access to plug-ins and components only in the case of gaining the necessary authorities. By using the proposed model, the access control can be applied based on both operational needs and applications capabilities accurately.
منابع مشابه
Access and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملFPGA Implementation of a Hammerstein Based Digital Predistorter for Linearizing RF Power Amplifiers with Memory Effects
Power amplifiers (PAs) are inherently nonlinear elements and digital predistortion is a highly cost-effective approach to linearize them. Although most existing architectures assume that the PA has a memoryless nonlinearity, memory effects of the PAs in many applications ,such as wideband code-division multiple access (WCDMA) or orthogonal frequency-division multiplexing (OFDM), can no longer b...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملMulti Attribute Analysis of a Novel Compact UWB Antenna with Via-fed Elements for Dual Band Notch Function (RESEARCH NOTE)
A compact microstrip-fed antenna with dual notched bands is proposed. First, a simple basic configuration is presented for Ultra Wide Band (UWB) applications and then the dual band notched structure is extended from the UWB one. The basic structure of the UWB antenna consists of a simple square radiating patch and a ground plane with a wide square slot on back of the substrate. A semi-circle sh...
متن کاملA combination of semantic and attribute-based access control model for virtual organizations
A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...
متن کاملNovel Four-Channel All Optical Demultiplexer Based on Square PhCRR for Using WDM Applications
Ring resonators have always been referred to as a highly flexible structurefor designing optical devices. In this study, we have designed and simulation a fourchannel optical demultiplexer using square photonic crystal ring resonator. The squarelattice constant for this purpose structure is used. The purposed structure has an averagecrosstalk, transmission coefficient, q...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJCNIS
دوره 8 شماره
صفحات -
تاریخ انتشار 2016