نتایج جستجو برای: secure access control

تعداد نتایج: 1651441  

Journal: :Scalable Computing: Practice and Experience 2011
Danny Harnik Elliot K. Kolodner Shahar Ronen Julian Satran Alexandra Shulman-Peleg Sivan Tal

Emerging storage cloud systems provide continuously available and highly scalable storage services to millions of geographically distributed clients. A secure access control mechanism is a crucial prerequisite for allowing clients to entrust their data to such cloud services. The seamlessly unlimited scale of the cloud and the new usage scenarios that accompany it pose new challenges in the des...

2009
Jianfeng Lu Ruixuan Li Vijay Varadharajan Zhengding Lu Xiaopu Ma

Ensuring secure interoperation in multidomain environments based on role based access control (RBAC) has drawn considerable research works in the past. However, RBAC primarily consider static authorization decisions based on subjects’ permissions on target objects, and there is no further enforcement during the access. Recently proposed usage control (UCON) can address these requirements of acc...

Journal: :Computer Networks 2002
Yi-Shiung Yeh Wei-Shen Lai Chung-Jaye Cheng

Lightweight Directory Access Protocol (LDAP) service is a new technology being applied on the Internet. On largescale network systems using Transmission control protocol (TCP)/Internet protocol (IP), there is no standard suggested for single directory––certainly without one to be routinely used on the scale of intranets. LDAP service has many great features, such as providing quick and advanced...

2004
Frederic Dufaux Susie Wee John Apostolopoulos Touradj Ebrahimi

In this paper, we first review the on-going JPSEC standardization activity. Its goal is to extend the baseline JPEG 2000 specification to provide a standardized framework for secure imaging, in order to support tools needed to secure digital images, such as content protection, data integrity check, authentication, and conditional access control. We then present two examples of JPSEC tools. The ...

2015
Wasim A. Al-Hamdani

This chapter investigates the problem of secure e-learning and the use cryptography algorithms as tools to ensure integrity, confidentiality, non-reputations, authentication, and access control to provide secure knowledge delivery, secure student feedback, and secure assessments. Providing privacy in e-learning focuses on the protection of personal information of a learner in an e-learning syst...

2006
Ian Molloy Radu Dondera Umang Sharan Elisa Bertino

RBAC or Role-Based Access Control is an approach to restrict system access to authorized users and help in implementing a secure access control for larger databases. MySQL is a popular open source relational database management system (RDBMS) which currently implements MAC and DAC access control mechanisms. We extend the access control policies in MySQL by adding the Core RBAC functionality to it.

2002
Javier Lopez Antonio Maña Ernesto Pimentel José M. Troya Mariemma Inmaculada Yagüe del Valle

Distributed systems usually contain objects with heterogeneous security requirements that pose important challenges on the underlying security mechanisms and especially in access control systems. Access control in distributed systems often relies on centralized security administration. Existing solutions for distributed access control do not provide the flexibility and manageability required. T...

1995
Ahmad Baraani-Dastjerdi Josef Pieprzyk Reihaneh Safavi-Naini Janusz R. Getta

In this paper a mechanism for access control at the instance level of a class in object-oriented databases is suggested. The approach is based on the use of pseudo-random functions and sibling intractable functions, rather than on the traditional access control list associated with each object. Each object-instance in the object-oriented model is associated with secure access keys that insure s...

Journal: :Ad Hoc Networks 2015
Hui Lin Li Xu Xinyi Huang Wei Wu Yijie Huang

Mobile cloud computing (MCC) is an emerging technology that has gained ever-increasing popularity, which makes the generation and large-scale collection of private personal data possible. However, new security issues arise when MCC offers big data analytics and management services. In particular, there is an absence of fine-grained secure access control model to protect privacy information from...

2007

Collaborative applications like video/audio conferencing, IP telephony, file sharing, collaborative work spaces, and multi-user games, having varied security requirements, require a secure and reliable group communication system to provide co-ordination among the processes. Peer to peer computing allows users to interact with each other and find and share resources without requiring a centraliz...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید