A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
A framework for decentralized access control
2007
Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07
We present a framework for decentralized authorization for physical access control, using smart cards, where access to individual rooms is guarded by context-dependent policies that are dynamically evaluated ...
The benefit of this approach lies in resolving authorizations in a decentralized manner in situations where the solution needs to scale with increasing number of users. ...
DECENTRALIZED ACCESS CONTROL FRAMEWORK -OVERVIEW The proposed system framework for physical access control is shown in Figure 1 . We refer to it as Decentralized Access Control (DAC) framework. ...
doi:10.1145/1229285.1229302
dblp:conf/ccs/BalasubramanianBCCG07
fatcat:ecsy6riimfetdgqleicstwp4a4
A trusted decentralized access control framework for the client/server architecture
2010
Journal of Network and Computer Applications
This paper proposes a trusted decentralized access control (TDAC) framework for the client/server architecture. ...
To implement TDAC, we design a private trusted reference monitor that runs at the client side, evaluates an access control request, and signs a temporary access control credential for a client application ...
A trusted decentralized access control framework for the client/server architecture. J Network Comput Appl (2010), doi:10.1016/j.jnca.2009.12.012 ...
doi:10.1016/j.jnca.2009.12.012
fatcat:nmowhswmyrc5rgaf7v4yewkrlq
B-DAC: A Decentralized Access Control Framework on Northbound Interface for Securing SDN Using Blockchain
[article]
2021
arXiv
pre-print
To address such limitations, we introduce B-DAC, a blockchain-based framework for decentralized authentication and fine-grained access control for the Northbound interface to assist administrators in managing ...
With strict policy enforcement, B-DAC can perform decentralized access control for each request to keep network applications under surveillance for preventing over-privileged activities or security policy ...
It is designed to be a decentralized framework for handling network applications in securing controller operation. ...
arXiv:2111.00707v1
fatcat:bc7k3nqptfhmvbuigv3v2pbony
Integrated Security, Authentication and Decentralized Access Control (ISADA) Framework Based on Novel Key Exchange Mechanism for a Public Cloud Environment
2020
International Journal of Advanced Trends in Computer Science and Engineering
This proposed framework (ISADA) gives a better solution for broken access control under horizontal privilege escalation. ...
This research paper proposes a Data security and User centric access control framework which provides two levels of security and multilayer access control mechanism by using key exchange. ...
This model assures secured, authenticated and authorized access control mechanism. It is a decentralized and user centric access control method. ...
doi:10.30534/ijatcse/2020/12952020
fatcat:23r5gyukcffs3lfyi42am63oqe
A Framework for the Decentralisation and Management of Collaborative Applications in Ubiquitous Computing Environments
2006
2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006
This paper examines how a migration to a more decentralized collaborative architecture can be achieved together with a decentralization of the management of collaborative activities. ...
However, such environments exert key challenges such as increased diversity of ownership and ad hoc, intermittent network connectivity that suits more decentralized computing architectures. ...
Karl Quinn's work receives a scholarship from IRCSET. ...
doi:10.1109/noms.2006.1687677
dblp:conf/noms/QuinnKFLOW06
fatcat:oyaxdjlf4zg3xpdl6ywmzaanpa
Contents
[chapter]
1963
Southern California Metropolis
STRATEGIES IN CHANGE OF LEGAL CONSTRAINTS
Gaining Access to the Legislature 120
Access to the People 134
Gaining Access to the Courts 140
II. CONTENDERS FOR LEADERSHIP
6. ...
LEGAL CONSTRAINTS: LEGISLATION
Legislative Actions Rounding out the Legal Framework for
Cities 80
Special Districts: A Flexible Device for Local Govern-
ment 9g
Bases for Intergovernmental Cooperation ...
doi:10.1525/9780520311640-toc
fatcat:yr5pbkezlbea7hkohawzaplzk4
Blockchain Platforms and Access Control Classification for IoT Systems
2020
Symmetry
In addition, we provide access control classifications. Finally, we highlight challenges and future research directions in developing decentralized access control mechanisms for IoT systems. ...
This paper presents a review of different access control mechanisms in IoT systems. We present a comparison table of reviewed access control mechanisms. ...
Blockchain-Based Decentralized Access Control for IoT This section provides a review of the relevant literature on decentralized access control for IoT based on blockchain. ...
doi:10.3390/sym12101663
fatcat:ng22fmd3qrelzli26fa6v7yizu
Decentralized Electronic Health Record System
2020
Journal of the Institute of Engineering
A block chain based EHR system has been built for secure, efficient and interoperable access to medical records by both patients and doctors while preserving privacy of the sensitive patient's information ...
A separate portal for both the patients and doctors has been built enabling the smart contracts to handle further interaction between doctors and patients. ...
These can be effectively accomplished in our framework with the arrangement of various Access Control List (ACL) which is exclusively dictated by the patient. ...
doi:10.3126/jie.v15i1.27716
fatcat:qgwqmysiq5eqtk3twfcot6fzcq
BlendMAS: A BLockchain-ENabled Decentralized Microservices Architecture for Smart Public Safety
[article]
2019
arXiv
pre-print
An extensive experimental study verified that the proposed BlendMAS is able to offer a decentralized, scalable and secured data sharing and access control to distributed IoT based SPS system. ...
Within a permissioned blockchain network, a microservices based security mechanism is introduced to secure data access control in an SPS system. ...
It aims at offering a scalable, decentralized and fine-grained access control solution for smart surveillance systems.
C. ...
arXiv:1902.10567v1
fatcat:xvjkadcqynbopfxbszprrvx53u
Dynamic Role-Based Access Control for Decentralized Applications
[article]
2020
arXiv
pre-print
We propose a novel framework to implement dynamic role-based access control for decentralized applications (dApps). ...
The framework allows for managing access control on a dApp, which is completely decoupled from the business application and integrates seamlessly with any dApps. ...
DYNAMIC ROLE-BASED ACCESS CONTROL Dynamic Role-Based Access Control is inspired by PERM Modelling Language [21] . It provides a generic solution framework to define permissions in a smart contract. ...
arXiv:2002.05547v2
fatcat:tcrktzd6sjcapks5uolumd7iz4
Proposing hierarchy-similarity based access control framework: A multilevel Electronic Health Record data sharing approach for interoperable environment
2017
Journal of King Saud University: Computer and Information Sciences
This paper proposes an access control framework that applies a Hierarchy Similarity Analyzer (HSA) on the policies need to be merged. ...
The system exhibits dynamic attributes of users and resources managed through access control policies defined for that environment. ...
Property
Decentralized access control framework Decentralized access control framework: The health professionals are assigned with a predefined set of access rights. ...
doi:10.1016/j.jksuci.2015.08.005
fatcat:dey4da73l5bllm5vmx4bcyfsf4
Sunspot: A Decentralized Framework Enabling Privacy for Authorizable Data Sharing on Transparent Public Blockchains
[article]
2021
arXiv
pre-print
In this paper, we propose Sunspot, a decentralized framework for privacy-preserving data sharing with access control on transparent public blockchains, to solve these issues. ...
Although direct encryption for on-chain data persistence can introduce confidentiality, new challenges such as key sharing, access control, and legal rights proving are still open. ...
In work [38] , a framework named BBDS is proposed for data sharing of electronic medical records (EMR). It adopts a decentralized access control mechanism to secure medical records. ...
arXiv:2111.03865v2
fatcat:wficzfogufcflhvggoc2icgjgm
A Blockchain-Based Architecture for Traffic Signal Control Systems
2019
2019 IEEE International Congress on Internet of Things (ICIOT)
This paper presents a novel decentralized and secure by design architecture for connected vehicle data security, which is based on the emerging blockchain paradigm. ...
The results show the performance of the proposed architecture for the traffic signal control system. ...
Hyperledger Fabric also provides Access Control to restrict data access to certain roles in the network. As for Query File, it works similar with conventional database query definitions. ...
doi:10.1109/iciot.2019.00018
dblp:conf/iciot/LiNZ19
fatcat:5qtexr26njhddot2ydizmlf27a
A Framework for Managing Access of Large-Scale Distributed Resources in a Collaborative Platform
2008
Data Science Journal
In order to enhance the scalability of access management, an integrated approach for decentralizing the task from resource owners to administrators on the platform is needed. ...
An access protocol that merges SAML and XACML is also included in the framework. It defines how distributed parties operate with each other to make decentralized authorization decisions. ...
It provides a unified method and format for expressing access control elements' policy. ...
doi:10.2481/dsj.7.137
fatcat:sjscolwlurhrzdmzudiqqqzsmi
Access Control Mechanism for IoT using Blockchain
2020
International journal of recent technology and engineering
A decentralized / distributed approach is therefore needed if a single failure point is avoided. ...
contract platform to achieve the access control ...
The proposed framework is achieved decentralized and trusted access control for the IoT. ...
doi:10.35940/ijrte.f1137.038620
fatcat:t3nzlx2olbc4jar6wrgg6cjvk4
« Previous
Showing results 1 — 15 out of 122,084 results