• No results found

Attribute-based access control

Verification of Resilience Policies that Assist Attribute Based Access Control

Verification of Resilience Policies that Assist Attribute Based Access Control

... Access control offers mechanisms to control and limit the actions or operations that are performed by a user on a set of resources in a ...Many access control models exist that are able ...

10

Preserving Privacy Using Attribute Based Access Control in DataStream

Preserving Privacy Using Attribute Based Access Control in DataStream

...  Access Control Mechanism I: The framework of Access Control Mechanism -I uses Attribute-based access control (ABAC), provides a high level of flexibility that ...

7

An Attribute based Access Control and it's Application on Cloud based Information Systems – a Survey

An Attribute based Access Control and it's Application on Cloud based Information Systems – a Survey

... An Attribute-based access control (ABAC), a relatively new authorization approach has gained an immense attention of ...to control un-authorized access to the data stored in a ...

5

Two-factor Authentication attribute-based Access Control System for Cloud Server

Two-factor Authentication attribute-based Access Control System for Cloud Server

... convenient access; and eligible users may also access the cloud system for various applications and services, user authentication has become a critical component for any cloud ...account/password ...

6

Authentication and Authorization Control in Computational Grid Environment using Fingerprint Minutiae Feature and Attribute Based Access Control

Authentication and Authorization Control in Computational Grid Environment using Fingerprint Minutiae Feature and Attribute Based Access Control

... Attribute Based Access Control is an idea to shift the standard of allowing particular user to access resource to estimating client's attributes for resource ...whether access ...

11

Security Using Ciphertext Policy Attribute Based Access Control: A Literature Survey.

Security Using Ciphertext Policy Attribute Based Access Control: A Literature Survey.

... mechanism[17]. Attribute based access control is one of the good technique available for encryption ...purpose. Attribute Based Access Control defines an ...

5

Secure and Efficient Attribute Based Access Control Optimization Scheme for EMR System

Secure and Efficient Attribute Based Access Control Optimization Scheme for EMR System

... system based on the cloud has serious leaks of patient data and private ...information. Access control and privacy protection are considered to be the keys to ensuring the privacy of ...patients. ...

7

Evaluation of EHR  Attribute Based Access Control (ABAC)  in Fog Computing

Evaluation of EHR Attribute Based Access Control (ABAC) in Fog Computing

... brisk access of these data in opportune ...that Attribute Based Access Control (ABAC) that relies upon properties of subject (who need to get to), question (administrations or data), ...

7

IaaS-cloud security enhancement: an intelligent attribute-based access control model and implementation

IaaS-cloud security enhancement: an intelligent attribute-based access control model and implementation

... Identity-Based Access Control (IBAC) categories, such as DAC and RBAC, face scalability challenges in a large system since they are based on the subject ...read access is granted ...its ...

138

Attribute-Based Access Control (ABAC)

Attribute-Based Access Control (ABAC)

... ABAC is not New Action User Subject Object Context Policy Authorization Decision Yes/No Attributes Mature Internet, 2000s XACML.. ABAC α Model Structure Policy Configuration Points[r] ...

27

ATTRIBUTE-BASED ACCESS CONTROL MODELS AND IMPLEMENTATION IN CLOUD INFRASTRUCTURE AS A SERVICE

ATTRIBUTE-BASED ACCESS CONTROL MODELS AND IMPLEMENTATION IN CLOUD INFRASTRUCTURE AS A SERVICE

... In this kind of extension, context information is used in access decision. Examples are [50, 63, 90, 101]. [89] propose context aware RBAC (CA-RBAC). [48] proposes to associate context in- formation with ...

160

An Auditable Attribute Based Access Control Mechanism in Openstack Cloud Environment

An Auditable Attribute Based Access Control Mechanism in Openstack Cloud Environment

... current Access Control Mechanism is ...the access decision. If the attributes of subject and object match the access is allowed and if attributes does not match access to object is ...

6

Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies

Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies

... class. The variance of these means ranges between 0.01 to 0.1. This experiment, the n-fold, represents the perfor- mance of the model on in-domain data. The high score of the precision and recall indicates model’s ...

25

Attribute-Based Access Control with Fixed-Size Cipher text

Attribute-Based Access Control with Fixed-Size Cipher text

... In our system we use Attribute Encryption Standard (AES) algorithm. This algorithm is used to protect classified information and is used by the total world to encrypt and decrypt sensitive data. AES consists of ...

8

A Time and Mutable Attribute-Based Access Control Model

A Time and Mutable Attribute-Based Access Control Model

... to access resources through the ...accounting based on usage of customers, and digital right management and content protection classification systems need to keep user online behaviors under ...the ...

9

Attribute Based Access to Scalable Media

Attribute Based Access to Scalable Media

... and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data ...data access control is desired, and thus do not ...

7

Privilege Data Access Control with Anonymity and Fully Anonymous Attribute-Based Encryption in Cloud Storage

Privilege Data Access Control with Anonymity and Fully Anonymous Attribute-Based Encryption in Cloud Storage

... monotonic access structure like a tree, which portrays this client's ...the access tree in his private key is fulfilled by the attribute in the ...whole control over the encryption ...to ...

6

Performing High-Precision Access Control and Flexibility to Outsourced Data with Attribute-Based Cryptosystems

Performing High-Precision Access Control and Flexibility to Outsourced Data with Attribute-Based Cryptosystems

... layouts based on the attribute based encryption have been proposed to secure the cloud sto ...the access control, while less attention is paid to the privilege control and the ...

8

Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption

Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption

... layouts based on the attribute based encryption have been proposed to secure the cloud sto ...the access control, while less attention is paid to the privilege control and the ...

7

PAbAC : a privacy preserving attribute based framework for fine grained access control in clouds

PAbAC : a privacy preserving attribute based framework for fine grained access control in clouds

... thorized access and the storage ...data access control is desired. In addition, access control policies as well as users’ access patterns are also considered as sensitive ...

16

Show all 10000 documents...

Related subjects