Filters








452,111 Hits in 3.2 sec

An Access Control Model for Tree Data Structures [chapter]

Alban Gabillon, Manuel Munier, Bascou Jean-Jacques, Laurent Gallon, Emmanuel Bruno
2002 Lecture Notes in Computer Science  
In this paper, we propose an access control model for generic tree data structures. This model can then be applied to any specific typed tree data structure.  ...  Consequently, an access control model which has been defined for a particular kind of tree cannot be easily adapted to another kind of tree.  ...  Access Control Model In this section, we define an access control model for tree data structures.  ... 
doi:10.1007/3-540-45811-5_9 fatcat:yy7ogxgblbh75jsbairunosphe

Application of XML tools for enterprise-wide RBAC implementation tasks

Ramaswamy Chandramouli
2000 Proceedings of the fifth ACM workshop on Role-based access control - RBAC '00  
different, but structurally similar model like Group-based Access Control model.  ...  control data for a commercial banking application.  ...  as the access control model, but a different but nonetheless structurally similar models like Group-based access control.  ... 
doi:10.1145/344287.344297 dblp:conf/rbac/Chandramouli00 fatcat:nzvufzr6wzagpchr6fmkq3wwoe

Access control of XML documents considering update operations

Chung-Hwan Lim, Seog Park, Sang H. Son
2003 Proceedings of the 2003 ACM workshop on XML security - XMLSEC '03  
Although for read queries the proposed access control model introduces a minor overhead in determining action types, for update queries it shows better performance compared to existing access control models  ...  In this paper, we discuss an XML access control model and propose a technique that supports not only read operations but also update operations.  ...  an access control model, information related to corresponding operators must also include data about access rights.  ... 
doi:10.1145/968559.968568 dblp:conf/xmlsec/LimPS03 fatcat:q34snnuvmndlvjunt4upuhvtv4

An efficient locking model for concurrency control in OODBS

G Arumugam, M Thangaraj
2005 Data Science Journal  
It is necessary for the system to control the interaction among the concurrent transactions. This paper presents a new locking model for concurrency control in object oriented database systems.  ...  The proposed model consists of a rich set of lock modes, hash table, lock-based signatures and B+ trees.  ...  concurrently access an object for a particular operation.  ... 
doi:10.2481/dsj.4.59 fatcat:qb2moglqovczxhosmxpt2zswje

Compact access control labeling for efficient secure XML query evaluation

Huaxin Zhang, Ning Zhang, Kenneth Salem, Donghui Zhuo
2007 Data & Knowledge Engineering  
Fine-grained access controls for XML define access privileges at the granularity of individual XML nodes. In this paper, we present a fine-grained access control mechanism for XML data.  ...  This mechanism exploits the structural locality of access rights as well as correlations among the access rights of different users to produce a compact physical encoding of the access control data.  ...  Although neither of these systems stores actual XML data, both provide tree-structured data models and instance-level access controls.  ... 
doi:10.1016/j.datak.2006.03.005 fatcat:kaz72mpllnhojolecjvnrxmv7y

Applying DAC Principles to the RDF Graph Data Model [chapter]

Sabrina Kirrane, Alessandra Mileo, Stefan Decker
2013 IFIP Advances in Information and Communication Technology  
Towards this end we provide a summary of access control requirements for graph data structures, based on the different characteristics of graph models compared to relational and tree data models.  ...  We subsequently focus on the RDF data model and identify a list of access rights based on SPARQL query operations; propose a layered approach to authorisation derivation based on the graph structure and  ...  We would like to thank Nuno Lopes and Aidan Hogan for their valuable comments on the paper.  ... 
doi:10.1007/978-3-642-39218-4_6 fatcat:3pxzuhrbyvenleg5hwhx77wrgq

The Research and Prospect of Secure Data Access Control in Cloud Storage Environment

Tengfei Li, Liang Hu, Yan Li, Jianfeng Chu, Hongtu Li, Hongying Han
2015 Journal of Communications  
To protect data security and user privacy, access control is an effective method.  ...  In this paper, we mainly discuss the cryptographybased secure data access control for cloud storage, as well as the future prospect.  ...  Let T be a tree representing an access structure. Each leaf node of the tree is associated with an attribute.  ... 
doi:10.12720/jcm.10.10.753-759 fatcat:ur7t6lyimbh27m7fwgwx7jwzky

Compact Access Control Labeling for Efficient Secure XML Query Evaluation

Huaxin Zhang, Ning Zhang, K. Salem, Donghui Zhuo
2005 21st International Conference on Data Engineering Workshops (ICDEW'05)  
Fine-grained access controls for XML define access privileges at the granularity of individual XML nodes. In this paper, we present a fine-grained access control mechanism for XML data.  ...  This mechanism exploits the structural locality of access rights as well as correlations among the access rights of different users to produce a compact physical encoding of the access control data.  ...  Although neither of these systems stores actual XML data, both provide tree-structured data models and instance-level access controls.  ... 
doi:10.1109/icde.2005.206 dblp:conf/icde/Zhang0SZ05 fatcat:fmzkeyy37jhpfa6bpn33upadoq

Role-based and time-bound access and management of EHR data

Rui Zhang, Ling Liu, Rui Xue
2013 Security and Communication Networks  
Our experimental results show that tree-like time structure can improve the performance of the key management scheme significantly and RBTBAC model is more suitable than existing solutions for EHR data  ...  We present a role-based and time-bound access control model (RBTBAC) that provides more flexibility of both roles (spatial capability) and temporal capability to control the access of sensitive data from  ...  control (RBTBAC) model for EHR systems.  ... 
doi:10.1002/sec.817 fatcat:cuivguqtirevplxowwdnrkuj6a

A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques

Jaichandran R, Et. al.
2021 Turkish Journal of Computer and Mathematics Education  
The emergence of cloud computing has completely changed the information technology sector, storage of information's and access control.  ...  To overcome the existing issue, in this paper we proposed an hybrid architecture invoking attribute based encryption (ABE) for encrypting the key and advanced encryption standard (AES) for file encryption  ...  The access control policy are stored in access tree structure. The shared users can access the data if the policy gets satisfied.  ... 
doi:10.17762/turcomat.v12i2.720 fatcat:sgthsyfudjdjbaz6onv62rjisi

Network security analyzing and modeling based on Petri net and Attack tree for SDN

Linyuan Yao, Ping Dong, Tao Zheng, Hongke Zhang, Xiaojiang Du, Mohsen Guizani
2016 2016 International Conference on Computing, Networking and Communications (ICNC)  
To the best of our knowledge, none so far has paid attention to the security analysis and modeling of Forwarding and Control planes Separation Network Structure (FCSNS) in SDN.  ...  In addition, it introduces the security analysis method of STRIDE to build up the Attack tree model.  ...  .  Dividing the FCSNS structure into three parts as user access, data transmission, and control command distribution, and modeling in Petri net [17] for the three partitions to represent network structure  ... 
doi:10.1109/iccnc.2016.7440631 dblp:conf/iccnc/YaoDZZDG16 fatcat:pwklc5jltvaxbbdkfoykfh2mji

A Review of fine grained access control techniques

Rakesh Shirsath, Dr K. V. Daya Sagar
2018 International Journal of Engineering & Technology  
Cloud computing model also brings many challenges for confidentiality, integrity, privacy of data and data access control.  ...  Therefore, an elastic access control or fine-grained access control approach for data is urgently required and becomes a challenging open problem.  ...  This paper surveyed different techniques about data access control concentrating on fine grained access control mechanisms.  ... 
doi:10.14419/ijet.v7i2.7.10249 fatcat:jaemco3hanhd5gpnojeojmbnsq

HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing

Zhiguo Wan, Jun'e Liu, Robert H. Deng
2012 IEEE Transactions on Information Forensics and Security  
We implement our scheme and show that it is both efficient and flexible in dealing with access control for outsourced data in cloud computing with comprehensive experiments.  ...  Several schemes employing attribute-based encryption (ABE) have been proposed for access control of outsourced data in cloud computing; however, most of them suffer from inflexibility in implementing complex  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their valuable comments.  ... 
doi:10.1109/tifs.2011.2172209 fatcat:7iw73lazbbb3tjdddssgyy5y4e

A new access control method based on multi-authority in cloud storage service

Sheng Luo, Qiang Liu
2018 International Journal of Computational Intelligence Systems  
And as one of key techniques to maintain security of data sharing, access control will play an important role in cloud storage services.  ...  This paper proposes an access control method for revocation of user rights in cloud storage services. Revoking user rights includes two aspects: revoking users and revoking attributes.  ...  Acknowledgments The authors would like to thank the anonymous referees and the editor for their valuable opinions.The subject is sponsored by the Social Science Planning Office of Guangzhou City, Guangdong  ... 
doi:10.2991/ijcis.11.1.36 fatcat:jm764sk5sbajpdyhy4iwkgrk4i

Efficient Access Control Permission Decision Engine Based on Machine Learning

Aodi Liu, Xuehui Du, Na Wang, Petros Nicopolitidis
2021 Security and Communication Networks  
However, owing to the massive policy scale and number of access control entities in open distributed information systems, such as big data, the Internet of Things, and cloud computing, existing access  ...  Access control technology is critical to the safe and reliable operation of information systems.  ...  Ros and Lischika [17] proposed a permission decision optimization method based on two tree structures: match tree and combination tree. e match tree uses a binary search algorithm to rapidly search for  ... 
doi:10.1155/2021/3970485 fatcat:dsv4buvj7bel5ej4rcvrlsdbhi
« Previous Showing results 1 — 15 out of 452,111 results