• No results found

secure access control mechanism

A Location based Secure Access Control Mechanism for Geospatial Data

A Location based Secure Access Control Mechanism for Geospatial Data

... a secure access control mechanism for geospatial data is ...can access only that part of spatial database, over which he has authority to ...level, access is controlled over an ...

5

Efficient and Secure Access Control Mechanism on Time Sensitive Data Set in Cloud

Efficient and Secure Access Control Mechanism on Time Sensitive Data Set in Cloud

... From the perspective of cryptography, the goal of composed release can be expert by Timed-Release Encryption (TRE). Rivest et al. [8] have proposed an intense TRE plan, and it has been likewise brought into different ...

5

Revocable Data Access Control for Secure Data Sharing In Cloud

Revocable Data Access Control for Secure Data Sharing In Cloud

... enhanced access control on the shared ...However, access control isn’t ...a mechanism that can remove him/her from the ...cannot access both the previously and subsequently ...

5

Secure Cloud Storage Using Decentralized Access Control with Unspecified Authentication

Secure Cloud Storage Using Decentralized Access Control with Unspecified Authentication

... distributed access control mechanism in ...Write access was not permitted to users other than the creator, our previous work with added features that enables to authenticate the validity of ...

9

Analysis of Different Access Control Mechanism in Cloud

Analysis of Different Access Control Mechanism in Cloud

... every access to the user will be mediated so the information that is accessed through cloud is more ...Here access is authorized or restricted to objects based on the time of day depending on the security ...

6

Privacy preserving access control mechanism with accuracy for relational data

Privacy preserving access control mechanism with accuracy for relational data

... This paper proposed two secure protocols to check K-anonymous database for anonymity when a new tuple is inserted. With the use of proposed protocol new database become K-anonymous, query result returned by user ...

5

Authentication and Access Control for Cloud Computing Using RBDAC Mechanism

Authentication and Access Control for Cloud Computing Using RBDAC Mechanism

... There has been a growing trend to store data in the cloud with the dramatic increase in the amount of digital information such as consumers personal data to larger enterprises. They are wanting to back up databases or ...

7

Access Control Based Privacy Protection Mechanism In Knowledge Extraction

Access Control Based Privacy Protection Mechanism In Knowledge Extraction

... Fig. 4 shows comparative study of execution time using with K- means and Without K-means clustering algorithm. In this figure the X axis shows the different products and Y axis shows Time in milliseconds. The complete ...

6

Implementation of Secure Authentication Scheme and Access Control in Cloud Computing

Implementation of Secure Authentication Scheme and Access Control in Cloud Computing

... and access control process in cloud ...to access cloud resource from external location or from public cloud the authetication system is ...Based Access and Control (RBAC) we have ...

15

Enforcing secure access control in integrated systems over the internet

Enforcing secure access control in integrated systems over the internet

... the access control requirements for users that will need to access other individual systems within the set of integrated systems needs to be ...of access control for each system for ...

7

Trust Enhanced Secure Cloud Data Storage Using Cryptographic Role-Based Access Control Mechanism

Trust Enhanced Secure Cloud Data Storage Using Cryptographic Role-Based Access Control Mechanism

... to secure stored ...flexible access policies, and cryptographic RBAC schemes ensure that these policies are enforced in the ...role-based access control system taking into account role ...

7

A Novel Access Control Mechanism to Secure the Data Dissemination in the Disruption Tolerant Network

A Novel Access Control Mechanism to Secure the Data Dissemination in the Disruption Tolerant Network

... Revocation of the Attributes : We observed that it is impossible to revoke specific attribute keys of a user without rekeying the whole set of key components of the user in ABE key structur e since the whole key set of a ...

6

Secure Access Mechanism for Cloud Storage

Secure Access Mechanism for Cloud Storage

... and Access Confinement. A key design point in our capability-based access control system is that it relieves the enforcement point from the duty of authenticating the identity of the request ...data ...

20

Researches on the access secure control workflow model based on role

Researches on the access secure control workflow model based on role

... Role-based access control model (RBAC) simplifies the permit ...the access control mechanism in the organization and the ...multi access control security model based on ...

9

Isolation Preserving Access Control Mechanism for Delicate Fitness Information

Isolation Preserving Access Control Mechanism for Delicate Fitness Information

... The personal health record system needs security against attackers and hackers. Scalable and Secure sharing includes basic securities to protect the information from unauthorized access and loss. This paper ...

6

Implementing Database Access Control Policy from Unconstrained Natural Language Text.

Implementing Database Access Control Policy from Unconstrained Natural Language Text.

... Once the oracle has been created, we ran the REDE Tool to produce several reports to pull out details to examine properties of sentences with access control. To evaluate how well we identify sentences with ...

186

A formally verified access control mechanism for information centric networks

A formally verified access control mechanism for information centric networks

... proposed mechanism; an intruder will not be able to compose Msg6, it can only replay ...the mechanism has been checked with Casper/FDR and no attack has been found as shown in Fig ...

7

Access Control Mechanism for Authorized Query Predicates on Sensitive data

Access Control Mechanism for Authorized Query Predicates on Sensitive data

... privacy-preserving access control mechanism, illustrated in ...protection mechanism ensures that the privacy and accuracy goals are met before the sensitive data is available to the ...

6

A Dynamic Access Control Method for SDN

A Dynamic Access Control Method for SDN

... fine-grained access control, utilizing the characteristics of SDN transfer control separation and software programming, the ABAC model (Attribute-Based Access Control) is extended by ...

11

Scalable and Flexible Access Control with Secure
          Data Auditing in Cloud Computing

Scalable and Flexible Access Control with Secure Data Auditing in Cloud Computing

... In CP-ABE scheme, the decryption keys only support user attributes that are organized logically as a single set, so users can only use all possible combinations of attributes in a single set issued in their keys to ...

6

Show all 10000 documents...

Related subjects