Filters








122,084 Hits in 2.6 sec

A framework for decentralized access control

Meenakshi Balasubramanian, Abhishek Bhatnagar, Namit Chaturvedi, Atish Datta Chowdhury, Arul Ganesh
2007 Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07  
We present a framework for decentralized authorization for physical access control, using smart cards, where access to individual rooms is guarded by context-dependent policies that are dynamically evaluated  ...  The benefit of this approach lies in resolving authorizations in a decentralized manner in situations where the solution needs to scale with increasing number of users.  ...  DECENTRALIZED ACCESS CONTROL FRAMEWORK -OVERVIEW The proposed system framework for physical access control is shown in Figure 1 . We refer to it as Decentralized Access Control (DAC) framework.  ... 
doi:10.1145/1229285.1229302 dblp:conf/ccs/BalasubramanianBCCG07 fatcat:ecsy6riimfetdgqleicstwp4a4

A trusted decentralized access control framework for the client/server architecture

Weili Han, Min Xu, Weidong Zhao, Guofu Li
2010 Journal of Network and Computer Applications  
This paper proposes a trusted decentralized access control (TDAC) framework for the client/server architecture.  ...  To implement TDAC, we design a private trusted reference monitor that runs at the client side, evaluates an access control request, and signs a temporary access control credential for a client application  ...  A trusted decentralized access control framework for the client/server architecture. J Network Comput Appl (2010), doi:10.1016/j.jnca.2009.12.012  ... 
doi:10.1016/j.jnca.2009.12.012 fatcat:nmowhswmyrc5rgaf7v4yewkrlq

B-DAC: A Decentralized Access Control Framework on Northbound Interface for Securing SDN Using Blockchain [article]

Phan The Duy, Hien Do Hoang, Do Thi Thu Hien, Anh Gia-Tuan Nguyen, Van-Hau Pham
2021 arXiv   pre-print
To address such limitations, we introduce B-DAC, a blockchain-based framework for decentralized authentication and fine-grained access control for the Northbound interface to assist administrators in managing  ...  With strict policy enforcement, B-DAC can perform decentralized access control for each request to keep network applications under surveillance for preventing over-privileged activities or security policy  ...  It is designed to be a decentralized framework for handling network applications in securing controller operation.  ... 
arXiv:2111.00707v1 fatcat:bc7k3nqptfhmvbuigv3v2pbony

Integrated Security, Authentication and Decentralized Access Control (ISADA) Framework Based on Novel Key Exchange Mechanism for a Public Cloud Environment

2020 International Journal of Advanced Trends in Computer Science and Engineering  
This proposed framework (ISADA) gives a better solution for broken access control under horizontal privilege escalation.  ...  This research paper proposes a Data security and User centric access control framework which provides two levels of security and multilayer access control mechanism by using key exchange.  ...  This model assures secured, authenticated and authorized access control mechanism. It is a decentralized and user centric access control method.  ... 
doi:10.30534/ijatcse/2020/12952020 fatcat:23r5gyukcffs3lfyi42am63oqe

A Framework for the Decentralisation and Management of Collaborative Applications in Ubiquitous Computing Environments

K. Quinn, A. Kenny, K. Feeney, D. Lewis, D. O'Sullivan, V.P. Wade
2006 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006  
This paper examines how a migration to a more decentralized collaborative architecture can be achieved together with a decentralization of the management of collaborative activities.  ...  However, such environments exert key challenges such as increased diversity of ownership and ad hoc, intermittent network connectivity that suits more decentralized computing architectures.  ...  Karl Quinn's work receives a scholarship from IRCSET.  ... 
doi:10.1109/noms.2006.1687677 dblp:conf/noms/QuinnKFLOW06 fatcat:oyaxdjlf4zg3xpdl6ywmzaanpa

Contents [chapter]

1963 Southern California Metropolis  
STRATEGIES IN CHANGE OF LEGAL CONSTRAINTS Gaining Access to the Legislature 120 Access to the People 134 Gaining Access to the Courts 140 II. CONTENDERS FOR LEADERSHIP 6.  ...  LEGAL CONSTRAINTS: LEGISLATION Legislative Actions Rounding out the Legal Framework for Cities 80 Special Districts: A Flexible Device for Local Govern- ment 9g Bases for Intergovernmental Cooperation  ... 
doi:10.1525/9780520311640-toc fatcat:yr5pbkezlbea7hkohawzaplzk4

Blockchain Platforms and Access Control Classification for IoT Systems

Adam Ibrahim Abdi, Fathy Elbouraey Eassa, Kamal Jambi, Khalid Almarhabi, Abdullah Saad AL-Malaise AL-Ghamdi
2020 Symmetry  
In addition, we provide access control classifications. Finally, we highlight challenges and future research directions in developing decentralized access control mechanisms for IoT systems.  ...  This paper presents a review of different access control mechanisms in IoT systems. We present a comparison table of reviewed access control mechanisms.  ...  Blockchain-Based Decentralized Access Control for IoT This section provides a review of the relevant literature on decentralized access control for IoT based on blockchain.  ... 
doi:10.3390/sym12101663 fatcat:ng22fmd3qrelzli26fa6v7yizu

Decentralized Electronic Health Record System

Ajaya Mandal, Prakriti Dumaru, Sagar Bhandari, Shreeti Shrestha, Subarna Shakya
2020 Journal of the Institute of Engineering  
A block chain based EHR system has been built for secure, efficient and interoperable access to medical records by both patients and doctors while preserving privacy of the sensitive patient's information  ...  A separate portal for both the patients and doctors has been built enabling the smart contracts to handle further interaction between doctors and patients.  ...  These can be effectively accomplished in our framework with the arrangement of various Access Control List (ACL) which is exclusively dictated by the patient.  ... 
doi:10.3126/jie.v15i1.27716 fatcat:qgwqmysiq5eqtk3twfcot6fzcq

BlendMAS: A BLockchain-ENabled Decentralized Microservices Architecture for Smart Public Safety [article]

Ronghua Xu, Seyed Yahya Nikouei, Yu Chen, Erik Blasch, Alex Aved
2019 arXiv   pre-print
An extensive experimental study verified that the proposed BlendMAS is able to offer a decentralized, scalable and secured data sharing and access control to distributed IoT based SPS system.  ...  Within a permissioned blockchain network, a microservices based security mechanism is introduced to secure data access control in an SPS system.  ...  It aims at offering a scalable, decentralized and fine-grained access control solution for smart surveillance systems. C.  ... 
arXiv:1902.10567v1 fatcat:xvjkadcqynbopfxbszprrvx53u

Dynamic Role-Based Access Control for Decentralized Applications [article]

Arnab Chatterjee and Yash Pitroda and Manojkumar Parmar
2020 arXiv   pre-print
We propose a novel framework to implement dynamic role-based access control for decentralized applications (dApps).  ...  The framework allows for managing access control on a dApp, which is completely decoupled from the business application and integrates seamlessly with any dApps.  ...  DYNAMIC ROLE-BASED ACCESS CONTROL Dynamic Role-Based Access Control is inspired by PERM Modelling Language [21] . It provides a generic solution framework to define permissions in a smart contract.  ... 
arXiv:2002.05547v2 fatcat:tcrktzd6sjcapks5uolumd7iz4

Proposing hierarchy-similarity based access control framework: A multilevel Electronic Health Record data sharing approach for interoperable environment

Shalini Bhartiya, Deepti Mehrotra, Anup Girdhar
2017 Journal of King Saud University: Computer and Information Sciences  
This paper proposes an access control framework that applies a Hierarchy Similarity Analyzer (HSA) on the policies need to be merged.  ...  The system exhibits dynamic attributes of users and resources managed through access control policies defined for that environment.  ...  Property Decentralized access control framework Decentralized access control framework: The health professionals are assigned with a predefined set of access rights.  ... 
doi:10.1016/j.jksuci.2015.08.005 fatcat:dey4da73l5bllm5vmx4bcyfsf4

Sunspot: A Decentralized Framework Enabling Privacy for Authorizable Data Sharing on Transparent Public Blockchains [article]

Yepeng Ding, Hiroyuki Sato
2021 arXiv   pre-print
In this paper, we propose Sunspot, a decentralized framework for privacy-preserving data sharing with access control on transparent public blockchains, to solve these issues.  ...  Although direct encryption for on-chain data persistence can introduce confidentiality, new challenges such as key sharing, access control, and legal rights proving are still open.  ...  In work [38] , a framework named BBDS is proposed for data sharing of electronic medical records (EMR). It adopts a decentralized access control mechanism to secure medical records.  ... 
arXiv:2111.03865v2 fatcat:wficzfogufcflhvggoc2icgjgm

A Blockchain-Based Architecture for Traffic Signal Control Systems

Wanxin Li, Mark Nejad, Rui Zhang
2019 2019 IEEE International Congress on Internet of Things (ICIOT)  
This paper presents a novel decentralized and secure by design architecture for connected vehicle data security, which is based on the emerging blockchain paradigm.  ...  The results show the performance of the proposed architecture for the traffic signal control system.  ...  Hyperledger Fabric also provides Access Control to restrict data access to certain roles in the network. As for Query File, it works similar with conventional database query definitions.  ... 
doi:10.1109/iciot.2019.00018 dblp:conf/iciot/LiNZ19 fatcat:5qtexr26njhddot2ydizmlf27a

A Framework for Managing Access of Large-Scale Distributed Resources in a Collaborative Platform

Su Chen, Tiejian Luo, Wei Liu, Jinliang Song, Feng Gao
2008 Data Science Journal  
In order to enhance the scalability of access management, an integrated approach for decentralizing the task from resource owners to administrators on the platform is needed.  ...  An access protocol that merges SAML and XACML is also included in the framework. It defines how distributed parties operate with each other to make decentralized authorization decisions.  ...  It provides a unified method and format for expressing access control elements' policy.  ... 
doi:10.2481/dsj.7.137 fatcat:sjscolwlurhrzdmzudiqqqzsmi

Access Control Mechanism for IoT using Blockchain

2020 International journal of recent technology and engineering  
A decentralized / distributed approach is therefore needed if a single failure point is avoided.  ...  contract platform to achieve the access control  ...  The proposed framework is achieved decentralized and trusted access control for the IoT.  ... 
doi:10.35940/ijrte.f1137.038620 fatcat:t3nzlx2olbc4jar6wrgg6cjvk4
« Previous Showing results 1 — 15 out of 122,084 results