نتایج جستجو برای: secure access control
تعداد نتایج: 1651441 فیلتر نتایج به سال:
Wireless sensor networks (WSNs) contain a large number of resource-constrained and energy-limited sensor nodes that are generally deployed in an open environment. Those sensor nodes communicate with each other or with a base station via wireless channels. Therefore, secure access control is an important issue inWSNs because sensor nodes are susceptible to various malicious attacks during the au...
Multi-tenancy, elasticity and dynamicity pose several novel challenges for access control in a cloud environment. Accessing subjects may dynamically change, resources requiring protection may be created or modified, and subject access requirements to resources may change during the course of the application execution. Users may need to acquire different permissions from different administrative...
Information-flow control tracks how information propagates through the program during execution to make sure that the program handles the information securely. Secure information flow is comprised of two related aspects: information confidentiality and information integrity — intuitively pertaining to the reading and writing of the information. The prevailing basic semantic notion of secure inf...
We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both session safety and a form of access control. Moreover, this type system ensures secure information flow, including controlled forms of declassification. In particular, it prevents information leaks due to the specific cont...
Nowadays due to the advancements in spatial data acquisition technologies, data acquisition technologies are producing mass high precision spatial data. To store such high precision data onto the database is a big challenge today. Spatial database is different from relational database as it contains data along with its location, so security concerns of spatial database are also different from r...
An access control scheme integrating with user authentication is proposed. Though the scheme is provably secure in request messaging (authentication), there is a flaw in access control. This paper presents an attack on the access control system; and further, an improvement is proposed to remedy this flaw. Our improvement only increases the information size and the cost of computations during re...
The Paranoid file system is an encrypted, secure, global file system with user-managed access control. The system provides efficient peer-to-peer applicationtransparent file sharing. This paper presents the design, implementation and evaluation of the Paranoid file system and its access-control architecture. The system lets users grant safe, selective, unix-like, file access to peer-groups acro...
Access control mechanisms are often used with the intent of enforcing confidentiality and integrity policies, but few rigorous connections have been made between information flow and runtime access control. The Java virtual machine and the .NET runtime system provide a dynamic access control mechanism in which permissions are granted to program units and a runtime mechanism checks permissions o...
This paper addresses the problem of static checking of programs to ensure that they satisfy confidentiality policies in the presence of dynamic access control in the form of Abadi and Fournet’s historybased access control mechanism. The Java virtual machine’s permissionbased stack inspection mechanism provides dynamic access control and is useful in protecting trusted callees from untrusted cal...
IBE, secure messaging, RBAC, access control, health care, security, privacy The management of confidential and sensitive information is a major problem for people and organisations. Dynamic organisations require secure solutions to protect confidential documents against unauthorised access and to cope with changes to people's roles and permissions. Solutions based on traditional cryptographic s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید