نتایج جستجو برای: secure access control

تعداد نتایج: 1651441  

Journal: :IJDSN 2015
Cheng-Yeh Chen Alan Dahgwo Yein Te-Cheng Hsu John Y. Chiang Wen-Shyong Hsieh

Wireless sensor networks (WSNs) contain a large number of resource-constrained and energy-limited sensor nodes that are generally deployed in an open environment. Those sensor nodes communicate with each other or with a base station via wireless channels. Therefore, secure access control is an important issue inWSNs because sensor nodes are susceptible to various malicious attacks during the au...

2013
Indrajit Ray

Multi-tenancy, elasticity and dynamicity pose several novel challenges for access control in a cloud environment. Accessing subjects may dynamically change, resources requiring protection may be created or modified, and subject access requirements to resources may change during the course of the application execution. Users may need to acquire different permissions from different administrative...

2012
Daniel Hedin Andrei Sabelfeld

Information-flow control tracks how information propagates through the program during execution to make sure that the program handles the information securely. Secure information flow is comprised of two related aspects: information confidentiality and information integrity — intuitively pertaining to the reading and writing of the information. The prevailing basic semantic notion of secure inf...

Journal: :Inf. Comput. 2014
Sara Capecchi Ilaria Castellani Mariangiola Dezani-Ciancaglini

We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both session safety and a form of access control. Moreover, this type system ensures secure information flow, including controlled forms of declassification. In particular, it prevents information leaks due to the specific cont...

2013
Manali Singh Rajpoot

Nowadays due to the advancements in spatial data acquisition technologies, data acquisition technologies are producing mass high precision spatial data. To store such high precision data onto the database is a big challenge today. Spatial database is different from relational database as it contains data along with its location, so security concerns of spatial database are also different from r...

Journal: :IEEE Trans. Consumer Electronics 2003
Fuw-Yi Yang Jinn-ke Jan

An access control scheme integrating with user authentication is proposed. Though the scheme is provably secure in request messaging (authentication), there is a flaw in access control. This paper presents an attack on the access control system; and further, an improvement is proposed to remedy this flaw. Our improvement only increases the information size and the cost of computations during re...

2005

The Paranoid file system is an encrypted, secure, global file system with user-managed access control. The system provides efficient peer-to-peer applicationtransparent file sharing. This paper presents the design, implementation and evaluation of the Paranoid file system and its access-control architecture. The system lets users grant safe, selective, unix-like, file access to peer-groups acro...

Journal: :J. Funct. Program. 2005
Anindya Banerjee David A. Naumann

Access control mechanisms are often used with the intent of enforcing confidentiality and integrity policies, but few rigorous connections have been made between information flow and runtime access control. The Java virtual machine and the .NET runtime system provide a dynamic access control mechanism in which permissions are granted to program units and a runtime mechanism checks permissions o...

2004
Anindya Banerjee David A. Naumann

This paper addresses the problem of static checking of programs to ensure that they satisfy confidentiality policies in the presence of dynamic access control in the form of Abadi and Fournet’s historybased access control mechanism. The Java virtual machine’s permissionbased stack inspection mechanism provides dynamic access control and is useful in protecting trusted callees from untrusted cal...

2003
Marco Casassa Mont Pete Bramhall Chris R. Dalton Keith Harrison

IBE, secure messaging, RBAC, access control, health care, security, privacy The management of confidential and sensitive information is a major problem for people and organisations. Dynamic organisations require secure solutions to protect confidential documents against unauthorised access and to cope with changes to people's roles and permissions. Solutions based on traditional cryptographic s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید