• No results found

Access Control Model

Access control model and labelling scheme for efficient querying and updating XML data

Access control model and labelling scheme for efficient querying and updating XML data

... fine-grained access control model, which supports read and write ...Our model supports various access ...defining access rules can be done ...our access control ...

193

A Multi dimensional Vector Based Access Control Model for Social Networks

A Multi dimensional Vector Based Access Control Model for Social Networks

... Next we will introduce the details of our access control model in figure 1. First, we construct the subject vector and object vector from subject and object. We use V(Subject)→φs and V(Object) →φo to ...

6

A  Novel  Cyberspace-Oriented  Access  Control  Model

A Novel Cyberspace-Oriented Access Control Model

... in access control, ...Existing access control models, which are always proposed for some specific scenarios, are hardly to achieve fine- grained and adaptive access ...Cyberspace-oriented ...

19

Extended Request oriented Role Access Control Model for Web Applications

Extended Request oriented Role Access Control Model for Web Applications

... Role-based Access Control // Advanced computers, ...Context-Aware Access Control Model for Web Services // Distributed and Parallel Databases Archive, ...

6

An Access Control Model for Avoiding Outsourcing Risks

An Access Control Model for Avoiding Outsourcing Risks

... proposed access control model that consist of two parties: the customer organization which communicated to an external outsourcing company, and the security outsourcing company that provide security ...

9

Modified Role Based Access Control Model For Data Security

Modified Role Based Access Control Model For Data Security

... Based Access Control model by extending traditional role based access control in SQL (Structure Query Language) data ...said model evaluates and executes security policies which ...

5

Privacy Aware using Temporal Role Based Access Control Model

Privacy Aware using Temporal Role Based Access Control Model

... Activity-based Access Control Model context constraint validation only occurs if the role requirements, role-cardinality activation constraint, and activity separation have been validated and ...

8

Context-sensitive Access Control Model for Business Processes

Context-sensitive Access Control Model for Business Processes

... workflow model which has a level request is proposed in ...this model has the attributes of the time domain and the security ...proposed model could be used in the field that has the higher security ...

34

An Access Control Model for Web Services with Dynamic Separation of Duty Rules

An Access Control Model for Web Services with Dynamic Separation of Duty Rules

... challenges. Access control is an important security mechanism for organizations to protect their resources in collaborative environments and ...Different access control models and mechanisms ...

8

Role of Time Domain Based Access Control Model

Role of Time Domain Based Access Control Model

... Role-Based Access Control Model (RBAC) is being analyzed, the concept of Role of Time- domain Based Access Control Model (T-RBAC) is put ...this model is ...This ...

6

Privacy enforcement with an extended role-based access control model

Privacy enforcement with an extended role-based access control model

... new access control model, called Usage Control (UCON), which can be used to deal with privacy issues in commercial and non-commercial ...UCON model encompasses traditional access ...

23

A Composite Access Control Model Based on Attribute and Role

A Composite Access Control Model Based on Attribute and Role

... object's access control requirements from the subject, a total of 1000 strategies are ...composite access control model.In the experimental test of access control effectiveness, ...

7

A Time and Mutable Attribute-Based Access Control Model

A Time and Mutable Attribute-Based Access Control Model

... unify access control model at a deeper level and propose the concept of usage control ...next-generation access control. Although the UCON model has features for future ...

9

Development of an access control model for web services applying XML-based approach

Development of an access control model for web services applying XML-based approach

... 2.6 Relationship Between SAML Components 24 2.7 Using SAML and XACML for Messaging and Assertions 27 2.8 The Specification Outlined by IBM and Microsoft 30 3.1 Research Procedure………………………………………………… 41 4.1 Proposed ...

27

An access control model for robot calibration

An access control model for robot calibration

... In summary, we have a set of intermediaries (OEMs and third par- ties that provide calibration services to hospitals), all of whom have confidentiality requirements. The device is at the highest level of confidentiality ...

7

An Access Control Model for NoSQL Databases

An Access Control Model for NoSQL Databases

... the access control requirement very ...complex access control ...cannot access any campaign data unless that access is authorized by the ‘Product Lead’ leading that ...security ...

86

ACMW: Access Control Model on Web Environment

ACMW: Access Control Model on Web Environment

... The main goal of our paper is to develop a Web access control model based on user access patterns, through mining usage data by tracking The Web access history. The Mining Phases In ...

5

Big Data Security with Access Control Model and Honeypot in Cloud Computing

Big Data Security with Access Control Model and Honeypot in Cloud Computing

... An access control model with honeypot is presented in this ...paper. Access control model deals with various parameters of authentication, log ...

5

A purpose based usage access control model

A purpose based usage access control model

... usage access control methods with XML document ...for access control are elements of XML ...the access control models based on the purpose ...an access control ...

8

A Critical Comparative Study and Characterisation of Access Control Model

A Critical Comparative Study and Characterisation of Access Control Model

... MAC model ensure confidentiality and integrity of data by controlling information flow, this does not feature in DAC ...MAC model for the process of access decision are based on predefined ...

11

Show all 10000 documents...

Related subjects