نتایج جستجو برای: abac

تعداد نتایج: 142  

Journal: :Electronics 2022

Effective access control techniques are in demand, as electronically assisted healthcare services require the patient’s sensitive health records. In emergency situations, where well-being is jeopardized, different actors associated with cases should be granted permission to Electronic Health Records (EHRs) of patients. The research objective our study develop machine learning based on patients’...

2014
Worachet Uttha Clara Bertolissi Silvio Ranise

Web services are independently written and managed, each with its own access control policy, thus it is challenging to control the access to the information they own. A particularly difficult case occurs when a service invokes another service to satisfy an initial request. We call this ”Transitive access problem”. To tackle this issue, we propose to use XACML for defining Attribute based Access...

Journal: :IEEE Access 2022

Insider threat is an ever-present challenge to corporate security. The availability of knowledge and privileges insiders makes it extremely difficult prevent, detect or deter malicious insider activities. In the literature, several studies have proposed deception-based approaches mitigate threats through different layers systems. However, integration access control cyber deception methods has n...

Journal: :IEEE Transactions on Cloud Computing 2023

The increasing popularity of remote Cloud File Sharing (CFS) has become a major concern for privacy breach sensitive data. Aiming at this concern, we present new resource sharing framework by integrating enterprise-side Attribute-Based Access Control/eXtensible Control Markup Language (ABAC/XACML) model, client-side Ciphertext-Policy Encryption (CP-ABE) scheme, and cloud-side CFS service. Moreo...

2015
Eric A. Carlen Rupert L. Frank Elliott H. Lieb

We consider trace functions (A,B) 7→ Tr[(ABA)] where A and B are positive n × n matrices and ask when these functions are convex or concave. We also consider operator convexity/concavity of ABA and convexity/concavity of the closely related trace functional Tr[ABAC]. The concavity questions are completely resolved, thereby settling cases left open by Hiai; the convexity questions are settled in...

2016
Evangelos Aktoudianakis

Relationship Based Access Control (ReBAC) has emerged as a popular alternative to traditional access control models, such as Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC). However, some of the model’s aspects, such as its expression language and delegation abilities have not been studied in depth. Furthermore, existing ReBAC models cater to single policy control, th...

Journal: :International Journal of Advanced Engineering Research and Science 2017

Journal: :SSRG international journal of electronics and communication engineering 2023

Cloud computing has regenerated how processing infrastructure is abstracted and used as a significant architecture for large-scale computation. In addition to the issues posed by Big Data storage, rapid growth of cloud increases complexity data confidentiality, security, user access regulations, resulting in loss service trustworthiness. The country society rely heavily on its security. We intr...

Journal: :Information 2023

The connected or smart environment is the integration of devices (sensors, IoT devices, actuator) into Internet Things (IoT) paradigm, in which a large number are connected, monitoring physical and processes transmitting centralized database for advanced analytics analysis. This integrated setup allows greater levels automation systems than possible with just Internet. While delivering services...

Journal: :Journal of physics 2021

Access control plays an important role in protecting data privacy. However, traditional access models such as RBAC, ABAC and UCON need to be built based on a central trusted server. Once the server is controlled by adversary, it will pose serious threat security. Therefore, this article proposes blockchain-based scheme, which uses blockchain replace smart contracts complete access. The proposed...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید