نتایج جستجو برای: secure access control

تعداد نتایج: 1651441  

2000
P. C. Clark M. C. Meissner K. O. Vance

In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and show how application-level firewalls and other commercial-off-the-shelf (COTS) products may be used to implement compartmentalized access to sensitive information and to provide access control over an untrusted networ...

2016
Somchart Fugkeaw Hiroyuk Sato

In a real-world collaborative data sharing scenario in cloud computing, there are multiple users who can access the resource shared by multiple data owners anytime and anywhere. The evolution of user status, roles, and privilege in the federated data sharing environment become even more and more complex to handle. Efficiently managing multiple access control policies and providing appropriate a...

1998
Joris Claessens Mark Vandenwauver Bart Preneel Joos Vandewalle

This paper discusses the practical issues that arise when securing the access to the World Wide Web (WWW). A brief overview of the different protocols that are proposed to secure the WWW is given and the current status of the U.S. export regulations is reviewed. An attack on SSL 2.0 is detailed which exploits some of the weaknesses in this protocol. The setup of a secure server with access cont...

2015
Priyanka R Chaudhari Archana C. Lomte

Data security is an important in cloud. Access control is major issue to secure the stored data in cloud. Thus the proposing privacy preserving authenticated access control scheme for securing shared data in cloud. In the proposed scheme supports authenticated access control for anonymous user to share data on cloud also additional feature in access control which provides authentication for the...

2003
Donghui Zhuo

Fine-grained access control for XML is about controlling access to XML documents at the granularity of individual elements or attributes. This thesis addresses two problems related to XML access controls. The first is efficient, secure evaluation of XPath expressions. We present a technique that secures path expressions by means of query modification, and we show that the query modification alg...

2000
Rickard Green

As the need for interaction between software components in unprotected open networks, such as the Internet, increases, the need for programming languages suited for development of secure distributed software components increases. Erlang is a programming language well suited for development of distributed software components. The lack of security mechanisms, such as access control and secure com...

2001
Stefan Schmid Joe Finney Maomao Wu Adrian Friday Andrew C. Scott Doug Shepherd

This document introduces a novel access control architecture for publicly accessible wireless overlay networks. The architecture is designed to address the problems of ubiquitous Internet service provisioning within the city of Lancaster. The proposed access control mechanism is based on the concepts of secure user authentication, packet marking, and network-level packet filtering. The novelty ...

Journal: :IEICE Transactions 2005
Wook Shin Jong-Youl Park Dong-Ik Lee

The current scheme of access control judges the legality of each access based on immediate information without considering associate information hidden in a series of accesses. Due to the deficiency, access control systems do not efficiently limit attacks consist of ordinary operations. For trusted operating system developments, we extended RBAC and added negative procedural constraints to refu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید