A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2005; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Access Control Model for Tree Data Structures
[chapter]
2002
Lecture Notes in Computer Science
In this paper, we propose an access control model for generic tree data structures. This model can then be applied to any specific typed tree data structure. ...
Consequently, an access control model which has been defined for a particular kind of tree cannot be easily adapted to another kind of tree. ...
Access Control Model In this section, we define an access control model for tree data structures. ...
doi:10.1007/3-540-45811-5_9
fatcat:yy7ogxgblbh75jsbairunosphe
Application of XML tools for enterprise-wide RBAC implementation tasks
2000
Proceedings of the fifth ACM workshop on Role-based access control - RBAC '00
different, but structurally similar model like Group-based Access Control model. ...
control data for a commercial banking application. ...
as the access control model, but a different but nonetheless structurally similar models like Group-based access control. ...
doi:10.1145/344287.344297
dblp:conf/rbac/Chandramouli00
fatcat:nzvufzr6wzagpchr6fmkq3wwoe
Access control of XML documents considering update operations
2003
Proceedings of the 2003 ACM workshop on XML security - XMLSEC '03
Although for read queries the proposed access control model introduces a minor overhead in determining action types, for update queries it shows better performance compared to existing access control models ...
In this paper, we discuss an XML access control model and propose a technique that supports not only read operations but also update operations. ...
an access control model, information related to corresponding operators must also include data about access rights. ...
doi:10.1145/968559.968568
dblp:conf/xmlsec/LimPS03
fatcat:q34snnuvmndlvjunt4upuhvtv4
An efficient locking model for concurrency control in OODBS
2005
Data Science Journal
It is necessary for the system to control the interaction among the concurrent transactions. This paper presents a new locking model for concurrency control in object oriented database systems. ...
The proposed model consists of a rich set of lock modes, hash table, lock-based signatures and B+ trees. ...
concurrently access an object for a particular operation. ...
doi:10.2481/dsj.4.59
fatcat:qb2moglqovczxhosmxpt2zswje
Compact access control labeling for efficient secure XML query evaluation
2007
Data & Knowledge Engineering
Fine-grained access controls for XML define access privileges at the granularity of individual XML nodes. In this paper, we present a fine-grained access control mechanism for XML data. ...
This mechanism exploits the structural locality of access rights as well as correlations among the access rights of different users to produce a compact physical encoding of the access control data. ...
Although neither of these systems stores actual XML data, both provide tree-structured data models and instance-level access controls. ...
doi:10.1016/j.datak.2006.03.005
fatcat:kaz72mpllnhojolecjvnrxmv7y
Applying DAC Principles to the RDF Graph Data Model
[chapter]
2013
IFIP Advances in Information and Communication Technology
Towards this end we provide a summary of access control requirements for graph data structures, based on the different characteristics of graph models compared to relational and tree data models. ...
We subsequently focus on the RDF data model and identify a list of access rights based on SPARQL query operations; propose a layered approach to authorisation derivation based on the graph structure and ...
We would like to thank Nuno Lopes and Aidan Hogan for their valuable comments on the paper. ...
doi:10.1007/978-3-642-39218-4_6
fatcat:3pxzuhrbyvenleg5hwhx77wrgq
The Research and Prospect of Secure Data Access Control in Cloud Storage Environment
2015
Journal of Communications
To protect data security and user privacy, access control is an effective method. ...
In this paper, we mainly discuss the cryptographybased secure data access control for cloud storage, as well as the future prospect. ...
Let T be a tree representing an access structure. Each leaf node of the tree is associated with an attribute. ...
doi:10.12720/jcm.10.10.753-759
fatcat:ur7t6lyimbh27m7fwgwx7jwzky
Compact Access Control Labeling for Efficient Secure XML Query Evaluation
2005
21st International Conference on Data Engineering Workshops (ICDEW'05)
Fine-grained access controls for XML define access privileges at the granularity of individual XML nodes. In this paper, we present a fine-grained access control mechanism for XML data. ...
This mechanism exploits the structural locality of access rights as well as correlations among the access rights of different users to produce a compact physical encoding of the access control data. ...
Although neither of these systems stores actual XML data, both provide tree-structured data models and instance-level access controls. ...
doi:10.1109/icde.2005.206
dblp:conf/icde/Zhang0SZ05
fatcat:fmzkeyy37jhpfa6bpn33upadoq
Role-based and time-bound access and management of EHR data
2013
Security and Communication Networks
Our experimental results show that tree-like time structure can improve the performance of the key management scheme significantly and RBTBAC model is more suitable than existing solutions for EHR data ...
We present a role-based and time-bound access control model (RBTBAC) that provides more flexibility of both roles (spatial capability) and temporal capability to control the access of sensitive data from ...
control (RBTBAC) model for EHR systems. ...
doi:10.1002/sec.817
fatcat:cuivguqtirevplxowwdnrkuj6a
A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques
2021
Turkish Journal of Computer and Mathematics Education
The emergence of cloud computing has completely changed the information technology sector, storage of information's and access control. ...
To overcome the existing issue, in this paper we proposed an hybrid architecture invoking attribute based encryption (ABE) for encrypting the key and advanced encryption standard (AES) for file encryption ...
The access control policy are stored in access tree structure. The shared users can access the data if the policy gets satisfied. ...
doi:10.17762/turcomat.v12i2.720
fatcat:sgthsyfudjdjbaz6onv62rjisi
Network security analyzing and modeling based on Petri net and Attack tree for SDN
2016
2016 International Conference on Computing, Networking and Communications (ICNC)
To the best of our knowledge, none so far has paid attention to the security analysis and modeling of Forwarding and Control planes Separation Network Structure (FCSNS) in SDN. ...
In addition, it introduces the security analysis method of STRIDE to build up the Attack tree model. ...
. Dividing the FCSNS structure into three parts as user access, data transmission, and control command distribution, and modeling in Petri net [17] for the three partitions to represent network structure ...
doi:10.1109/iccnc.2016.7440631
dblp:conf/iccnc/YaoDZZDG16
fatcat:pwklc5jltvaxbbdkfoykfh2mji
A Review of fine grained access control techniques
2018
International Journal of Engineering & Technology
Cloud computing model also brings many challenges for confidentiality, integrity, privacy of data and data access control. ...
Therefore, an elastic access control or fine-grained access control approach for data is urgently required and becomes a challenging open problem. ...
This paper surveyed different techniques about data access control concentrating on fine grained access control mechanisms. ...
doi:10.14419/ijet.v7i2.7.10249
fatcat:jaemco3hanhd5gpnojeojmbnsq
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
2012
IEEE Transactions on Information Forensics and Security
We implement our scheme and show that it is both efficient and flexible in dealing with access control for outsourced data in cloud computing with comprehensive experiments. ...
Several schemes employing attribute-based encryption (ABE) have been proposed for access control of outsourced data in cloud computing; however, most of them suffer from inflexibility in implementing complex ...
ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their valuable comments. ...
doi:10.1109/tifs.2011.2172209
fatcat:7iw73lazbbb3tjdddssgyy5y4e
A new access control method based on multi-authority in cloud storage service
2018
International Journal of Computational Intelligence Systems
And as one of key techniques to maintain security of data sharing, access control will play an important role in cloud storage services. ...
This paper proposes an access control method for revocation of user rights in cloud storage services. Revoking user rights includes two aspects: revoking users and revoking attributes. ...
Acknowledgments The authors would like to thank the anonymous referees and the editor for their valuable opinions.The subject is sponsored by the Social Science Planning Office of Guangzhou City, Guangdong ...
doi:10.2991/ijcis.11.1.36
fatcat:jm764sk5sbajpdyhy4iwkgrk4i
Efficient Access Control Permission Decision Engine Based on Machine Learning
2021
Security and Communication Networks
However, owing to the massive policy scale and number of access control entities in open distributed information systems, such as big data, the Internet of Things, and cloud computing, existing access ...
Access control technology is critical to the safe and reliable operation of information systems. ...
Ros and Lischika [17] proposed a permission decision optimization method based on two tree structures: match tree and combination tree. e match tree uses a binary search algorithm to rapidly search for ...
doi:10.1155/2021/3970485
fatcat:dsv4buvj7bel5ej4rcvrlsdbhi
« Previous
Showing results 1 — 15 out of 452,111 results