نتایج جستجو برای: secure access control

تعداد نتایج: 1651441  

Journal: :IEEE Transactions on Cloud Computing 2023

The increasing popularity of remote Cloud File Sharing (CFS) has become a major concern for privacy breach sensitive data. Aiming at this concern, we present new resource sharing framework by integrating enterprise-side Attribute-Based Access Control/eXtensible Control Markup Language (ABAC/XACML) model, client-side Ciphertext-Policy Encryption (CP-ABE) scheme, and cloud-side CFS service. Moreo...

2008
Dae-Kyoo Kim Lunjin Lu

This paper presents a set of transformation rules for transforming a non-secure interaction model to a secure interaction model using an access control pattern. The transformation rules resolve conflicts, uncertainties and type mismatches that may arise during pattern application. We demonstrate a case study using the Mandatory Access Control pattern and a defense messaging system in the milita...

2003
Mark Evered

The per-method access control lists of standard internet technologies allow only simple forms of access control to be expressed and enforced. They also fail to enforce a strict need-to-know view of persistent data. Real applications require more flexible security constraints including parameter restrictions, logging of accesses and state-dependent access constraints. In particular, the concept ...

2000
Apu Kapadia Jalal Al-Muhtadi Roy H. Campbell M. Dennis Mickunas

The secure interaction between two or more administrative domains is a major concern. We examine the issues of secure interoperability between two security domains operating under the Role Based Access Control (RBAC) Model. We propose a model that quickly establishes a exible policy for dynamic role translation. The role hierarchies of the local and foreign domains can be manipulated through ou...

2013
Marzieh Bahrami Mohammad Reza Khayyambashi Seyed Ali Razavi Ebrahimi

There have been many security solutions to secure representation in the work flow used in business processes and Grid Networks. Most of these solutions try to provide maximum security in workflow processes and most of them are used Role-Based Access Control model (RBAC). Capability Role-Base Access Control (CRBAC) is one of the models that are used to model RBAC which in this paper, we introduc...

2005
ZHANG Shaomin WANG Baoyi

Organizations use PKI (Public Key Infrastructures) to support internal business processes, but some businesses have industrial partnerships with others, and these alliances can exploit B2B (Business to Business) e-commerce capabilities by connecting corporate PKI. The paper deals with two methods to realize access control in extended organization PKI business processes: BCAs (Bridge Certificati...

Journal: :JSW 2012
Lili Sun Hua Wang Jeffrey Soar Chunming Rong

Information privacy is a major concern in many areas and none more so than in healthcare. E-healthcare is the use of web-based systems to share and deliver information across the internet. The design of proper models for authorization and access control for e-Health system services is necessary in a large health service. Usage control has been considered as the next generation access control mo...

2014
Ranjana Badre

Providing secure and efficient access to large scale outsourced data is an important issue of cloud computing. In this paper, a mechanism FADE, a secure overlay cloud storage system, which will guarantee assured file deletion and improved access control for outsourced data is proposed. Cryptographic approach is used for storing and managing data..

2015
Tina Belinda Miranda

In this paper, we consider ‘secure attribute based system with short ciphertext’ is a tool for implementing fine-grained access control over encrypted data, and is conceptually similar to traditional access control methods such as Role-Based Access Control. However, current ‘secure attribute based system with short ciphertext’ schemes suffer from the issue of having long decryption keys, in whi...

2014
Yudi Prayudi Ahmad Ashari Tri K Priyambodo T. F. Gayed H. Lounis

Chain of custody is the procedure to do a chronological documentation of evidence, and it is an important procedure in the investigation process. Both physical and digital evidence is an important part in the process of investigation and courtroom. However, handling the chain of custody for digital evidence is more difficult than the handling of physical evidence. Nevertheless, the handling of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید