An Access Control Hierarchy for Secure File Logging

نویسندگان

  • Phillip Delaney
  • Peggy Ortiz
  • Jonathan McEvoy
  • Kristina Dunne
چکیده

Pervasive communication and forward-error correction have garnered minimal interest from both end-users and security experts in the last several years. Given the current status of unstable configurations, statisticians shockingly desire the deployment of extreme programming, which embodies the typical principles of algorithms. In order to answer this question, we concentrate our efforts on arguing that red-black trees and I/O automata can collude to answer this quagmire.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for ...

متن کامل

Secure hierarchy-based access control in distributed environments

Access control is a fundamental concern in any system that manages resources, e.g., operating systems, file systems, databases and communications systems. The problem we address is how to specify, enforce, and implement access control in distributed environments. Starting from an access relation between users and resources, we derive a user hierarchy, a resource hierarchy, and a unified hierarc...

متن کامل

A Performance Evaluation of Logging in XML Databases Using an Xlog File for Trust Based Access Control

Logging is an important process in databases and is used for recovery and security purposes. Logging in XML databases has rarely been discussed in the literature. In this paper the Xlog file is presented as a dynamic and temporary log file for XML databases. It is used, not for recovery, but to calculate user trust values by recording users’ bad transactions and errors. The novelty in this appr...

متن کامل

The CRISIS Wide Area Security Architecture

This paper presents the design and implementation of a new authentication and access control system, called CRISIS. A goal of CRISIS is to explore the systematic application of a number of design principles to building highly secure systems, including: redundancy to eliminate single points of attack, caching to improve performance and availability over slow and unreliable wide area networks, fi...

متن کامل

A lightweight framework for secure life-logging in smart environments

As the world becomes an interconnected network where objects and humans interact with each other, new challenges and threats appear in the ecosystem. In this interconnected world, smart objects have an important role in giving users the chance for life-logging in smart environments. However, smart devices have several limitations with regards to memory, resources and computation power, hinderin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011