نتایج جستجو برای: secure access control

تعداد نتایج: 1651441  

2016
Aditi Gupta ADITI GUPTA ELISA BERTINO MIKHAIL J. ATALLAH NINGHUI LI SONIA FAHMY SUNIL PRABHAKAR Elisa Bertino Mikhail J. Atallah Sonia Fahmy

Gupta, Aditi Ph.D., Purdue University, December 2014. Secure Platforms for Enforcing Contextual Access Control. Major Professor: Elisa Bertino. Advances in technology and wide scale deployment of networking enabled portable devices such as smartphones has made it possible to provide pervasive access to sensitive data to authorized individuals from any location. While this has certainly made dat...

Journal: :I. J. Network Security 2007
Cungang Yang

In the secure domain computing environments, it is important to keep resources and information integrity from unauthorized access. Therefore, there is a strong demand on the access control for shared resources. In the past few years, Role-based Access Control (RBAC) has been introduced and offered a powerful means of specifying access control decisions. In this paper, an Object Oriented RBAC mo...

2009
Yongcai Wang Junhui Zhao Toshikazu Fukushima

With proliferation of ubiquitous computing, digital access is facing an increasing risk since unauthorized client located at any place may intrude a local server. Location Based Access Control (LBAC) is a promising solution that tries to protect the client’s access within some user-defined secure zones. Although a lot of prior work has focused on LBAC, most of them suffer from coarse judgment r...

2014

Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients' control over access to their own PHRs, i...

Journal: :Future Generation Comp. Syst. 2013
Alessio Merlo

The access to Grid resources depends on policies defined by the administrators of the physical organizations and of the Grid middleware. This approach does not require support for access control in the middleware, but since changes in the access control policy of the Virtual Organization imply the involvement of one or more administrators, it lacks the flexibility needed in several Grid applica...

2016
Enrico Bacis Sabrina De Capitani di Vimercati Sara Foresti Stefano Paraboschi Marco Rosa Pierangela Samarati

With the widespread success and adoption of cloud-based solutions, we are witnessing an ever increasing reliance on external providers for storing and managing data. This evolution is greatly facilitated by the availability of solutions typically based on encryption ensuring the confidentiality of externally outsourced data against the storing provider itself. Selective application of encryptio...

2003
Mark Evered

The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Given the increasing use of webbased applications involving sensitive data, the increased threat and the stringent requirements of privacy laws, a more flexible and secure approach is needed. In this paper we present a three-step approach to access cont...

Journal: :I. J. Network Security 2007
Leon Pan

This paper presents a Criterion-Based Role-Based Access Control model in which secure permissions (SP), secure operations (SOp), secure objects (SOb), and secure users (SU) are introduced. The security criterion expressions (SCE) embedded in SOb work as locks and the common elements of the security criterion subsets (SCSS) in SOp and SU work as keys. To support web-based applications, the remot...

Journal: :JoWUA 2010
Anand Nagarajan Christian Damsgaard Jensen

The electrical power infrastructure is facing a transition from a largely centralised distribution infrastructure with a few large power plants to an increasingly distributed infrastructure that must incorporate privately owned and operated power generation units based on fuel cells or sustainable energy sources, such as wind turbines, solar energy or wave energy. This introduces important new ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید