• No results found

policy-based access control framework

Requirements-Based Access Control Analysis and Policy Specification

Requirements-Based Access Control Analysis and Policy Specification

... basic framework for ensuring compliance between different levels of policies, system requirements and software ...derive access control policies from system requirements and high-level security and ...

256

Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies

Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies

... traditional access control mechanisms to a target access control model, be it ABAC or role-based access control ...optimize policy goodness ...learning- ...

25

A Workflow-based Access Control Framework for Healthcare Applications

A Workflow-based Access Control Framework for Healthcare Applications

... gation policy disables the authorisation policy used for performing the ...obligation policy in- forms the WMS that the current task is concluded by checking back the task in the ...our ...

10

PAbAC : a privacy preserving attribute based framework for fine grained access control in clouds

PAbAC : a privacy preserving attribute based framework for fine grained access control in clouds

... attribute based signatures ...tribute based signatures requires users’ privacy and ...attribute based signature to ensure the authentication of data owners and fine grained access ...

16

A Cognitive Management Framework to Support Exploitation of the Future Internet of Things

A Cognitive Management Framework to Support Exploitation of the Future Internet of Things

... A policy can have multiple rules, which define what resources can be accessed and managed ...specific access level ...of access rights: create, read, modify. Under specific rules, access ...

9

Access Control Policy: A Framework to Enforce 
                      Recommendations

Access Control Policy: A Framework to Enforce Recommendations

... the Policy Certification Type document “Authentication Server” issued by the National Security Information Systems[14] stipulates that: “Requirements, common to all levels and specific to a given level, specified ...

12

Attribute Based Access to Scalable Media

Attribute Based Access to Scalable Media

... the access policy.However in orderto design an access policy mechanism there are manychallenges to overcome some of them are (1)user canupload any kind of data like text, media ...of access to ...

7

Access control scheme to big data using privacy preserving policy

Access control scheme to big data using privacy preserving policy

... the access to a huge amount of big data becomes a very challenging issue, especially when big data are stored in the ...the access policies defined over some attributes of data consumers and only allows ...

8

Security Using Ciphertext Policy Attribute Based Access Control: A Literature Survey.

Security Using Ciphertext Policy Attribute Based Access Control: A Literature Survey.

... Here access structure used are the AND gate of the attribute ...same access structure using AND gate the Original file can get without using private ...

5

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage

... user access rights via attribute ...user’s access right is revoked, the attribute authority generates a new re-encryption key for the system’s semi-trusted on-line proxy ...

5

PARALLEL, DECENTRALIZED AND INDIVIDUAL ACCESSING IN ENCRYPTED CLOUD COMPUTING

PARALLEL, DECENTRALIZED AND INDIVIDUAL ACCESSING IN ENCRYPTED CLOUD COMPUTING

... propose policy primarily based} file access and policy based file assured deletion for higher access to the files and delete the files that are strong-minded not a lot ...renewal ...

5

Access Control Framework for API Enabled Devices

Access Control Framework for API Enabled Devices

... to access API-enabled devices in smart buildings, it may harm an occupant’s life for instance by locking a door, turning off lights or air conditioners, which make occupants, lose their comfortable and so ...an ...

6

Toward Visualizing Potential Policy Conflicts in eXtensible Access Control Markup Language (XACML)

Toward Visualizing Potential Policy Conflicts in eXtensible Access Control Markup Language (XACML)

... independent policy components by different policy writers and can be enforced at their particular enforcement ...the Policy decision point (PDP) is still required to examine the <Target> ...

62

ACM Access control using k-anonymity, query evaluate on outsourced database

ACM Access control using k-anonymity, query evaluate on outsourced database

... Anonymity is prostrate to homogeneousness approaches when the sensitive value for all the tuples in an equipollence class is equipollent. To contravene this defect, l-diversity has been placed and demands that each ...

8

Improved Secure Access Control in Cloud Using Sign Based Ciphertext-Policy Attribute-Based Encryptio

Improved Secure Access Control in Cloud Using Sign Based Ciphertext-Policy Attribute-Based Encryptio

... data access control of cloud storage systems, as users may hold attributes issued by multiple authorities and data owners may also share the data using access policy defined over attributes ...

5

ACCESS CONTROL AND SECURE DATA RETRIEVAL BASED ON CIPHERTEXT POLICY ATTRIBUTE-BASED ENCRYPTION IN DECENTRALIZED DTNS

ACCESS CONTROL AND SECURE DATA RETRIEVAL BASED ON CIPHERTEXT POLICY ATTRIBUTE-BASED ENCRYPTION IN DECENTRALIZED DTNS

... a policy for each user that determines which ciphertexts he can decrypt and issues the key to each user by embedding the policy into the user’s ...an access policy chosen by an encryptor, but ...

8

Control access security: wireless LAN auditing framework

Control access security: wireless LAN auditing framework

... Institute Electrical and Electronics Engineers [IEEE] 802.3 exist since Ethernets is found. IEEE is generally the institute is the founder of 802.3 standard protocols for Ethernet, although 802.3 is not used now because ...

14

Modelling a Policy Role Based Access Control Mechanism for Task Delegation in a Nomadic Environment

Modelling a Policy Role Based Access Control Mechanism for Task Delegation in a Nomadic Environment

... Role Based Access Control (RBAC) Mechanisms to proffer access control solutions to role assignments which ordinarily would have be accomplished ...organizational policy rules ...

13

Non-Destructive Determination of Magnetic Audio Tape Degradation for Various Tape Chemistries Using Spectroscopy and Chemometrics

Non-Destructive Determination of Magnetic Audio Tape Degradation for Various Tape Chemistries Using Spectroscopy and Chemometrics

... OWL 2 profiles are the result of imposing syntactic restrictions on OWL 2 ontologies. OWL 2 has three profiles (sub-languages) EL, RL and QL. EL captures the expressive power used by many OWL 2 ontologies. The basic ...

125

Policy Specification in Role based Access Control on Clouds

Policy Specification in Role based Access Control on Clouds

... work access control method to enhance the security on ...attractive access model because the number of roles is significantly less hence users can be easily classified according to their ...

5

Show all 10000 documents...

Related subjects