Filters








755,721 Hits in 5.2 sec

Access control in federated systems

Sabrina De Capitani di Vimercati, Pierangela Samarati
1996 Proceedings of the 1996 workshop on New security paradigms - NSPW '96  
In this paper we outline some of these issues and illustrate the basic ideas of possible authorization model for the protection of information in federated systems.  ...  One of the new emerging technology for data management is today represented by federated systems.  ...  A proposal for an authorization model for federated systems In this section we illustrate an authorization model, on which we are currently working, targeted to the protection of information in a federated  ... 
doi:10.1145/304851.304871 dblp:conf/nspw/VimercatiS96 fatcat:woct4esbtjcgdd647a4jbde2zu

The security architecture of IRO-DB [chapter]

Wolfgang Eßmayr, Friedrich Kastner, Günther Pernul, A. Min Tjoa
1996 IFIP Advances in Information and Communication Technology  
It includes a procedure for conflict resolution within the set of specified authorization rules, and concentrates on role-based security.  ...  Additionally, the integration of heterogeneous, local security policies of database systems joining the federation is discussed.  ...  (Germany), and FA W Linz (Austria), for many interesting discussions on technical meetings.  ... 
doi:10.1007/978-1-5041-2919-0_22 fatcat:rtztgfpnovhbrlwq2vq3mxcqpy

Federated Learning for Intrusion Detection in the Critical Infrastructures: Vertically Partitioned Data Use Case

Evgenia Novikova, Elena Doynikova, Sergey Golubev
2022 Algorithms  
To evaluate the applicability of the federated learning for this case, the authors developed an approach and an architecture of the intrusion detection system for vertically partitioned data that consider  ...  For this goal, federated learning is used to train an intrusion detection model.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/a15040104 fatcat:u3dfkixt2rhttby2epeaifvnhu

Access controls for federated database environments - taxonomy of design choices [chapter]

W. Eβmayr, F. Kastner, S. Preishuber, G. Pernul, A M. Tjoa
1995 IFIP Advances in Information and Communication Technology  
Additionally, the impact of distribution, heterogeneity and autonomy, three characteristics of database federations, is examined for each of the design choices.  ...  The taxonomy is organized in the categories granularity, authorization, and access control.  ...  (Germany), and FAW Linz (Austria), for many interesting discussions on technical meetings.  ... 
doi:10.1007/978-0-387-34943-5_11 fatcat:ugzmctej3zbrxp3kedry5pq3o4

Research and implementation of object model in HLA

Xia Zhang, Shabai Huang, Jizhou Sun, Zhigeng Pan
2004 Fourth International Conference on Virtual Reality and Its Applications in Industry  
Object Model is important to implement purpose of HLA. OM provides a standard template to describe the abilities of simulations joining federate and the demands of outer systems.  ...  With the primary practice of navy salvage drilling simulation system, the authors give the designing of OM with an example according to the designing principle of OM.  ...  For HLA object models, the intended scope of the system description is much narrower, focusing specifically on requirements and capabilities for federate/federation information exchange.  ... 
doi:10.1117/12.561132 fatcat:q6oqyagax5fthgm6w2ujjrcpqa

Building Secure Data Warehouse Schemas from Federated Information Systems [chapter]

Fèlix Saltor, Marta Oliva, Alberto Abelló, José Samos
2002 Heterogeneous Information Exchange and Organizational Hubs  
There are similarities between architectures for Federated Information Systems and architectures for Data Warehousing.  ...  In the context of an integrated architecture for both Federated Information Systems and Data Warehousing, we discuss how additional schema levels provide security, and operations to convert from one level  ...  Federated Information Systems (FIS) The area of Federated and Interoperable Databases and FIS has already been researched for a number of years (for concepts see for example [BE96] , [ERS99] , [Thu97  ... 
doi:10.1007/978-94-017-1769-4_8 fatcat:5nhe5yiaefalfb4rgmsnvgd5g4

Extending the SDSI / SPKI Model through Federation Webs [chapter]

Altair Olivo Santin, Joni da Silva Fraga, Carlos Maziero
2003 Lecture Notes in Computer Science  
Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service.  ...  Newer systems, with trust paradigm focused on the client and based on authorization chains, as SDSI/SPKI, are much more scalable.  ...  The X.509 PKI, for example, adopts a global naming system (X.500), which is based on a hierarchical trust model formed by Certification Authorities (CA).  ... 
doi:10.1007/978-3-540-45184-6_11 fatcat:zf7rvsx7ajaybph6koqktknusq

Usage Control in Cloud Federations

Gaetano F. Anastasi, Emanuele Carlini, Massimo Coppola, Patrizio Dazzi, Aliaksandr Lazouski, Fabio Martinelli, Gaetano Mancini, Paolo Mori
2014 2014 IEEE International Conference on Cloud Engineering  
Results suggest that the UCON model can be effectively applied in Cloud Federations and its performance is sustainable when applied to the relevant actions of the lifecycle of applications.  ...  We exploited an extension of the XACML standard and measured the overhead caused by different security policies and distributions of requests.  ...  ACKNOWLEDGMENT The authors acknowledge the support of Projects: FP7-257438 Contrail: Open Computing Infrastructures for Elastic Services and FP7-256980 NESSoS: Network of Excellence on Engineering Secure  ... 
doi:10.1109/ic2e.2014.58 dblp:conf/ic2e/AnastasiCCDLMMM14 fatcat:isxzbclyonfqzcrdnmjndtk2ci

Autonomous Decentralized Authorization and Authentication Management for Hierarchical Multi-Tenancy

Qiong ZUO, Meiyi XIE, Wei-Tek TSAI
2016 IEICE transactions on communications  
SaaS systems. key words: Multi-Tenancy Architecture, hierarchical multi-tenancy, Rolebased Access Control Model, tenant-based access control model  ...  AA is also used as an autonomous unit to create and deploy the access permissions for tenants.  ...  Extensions of RBAC model have been proposed for collaborative authorization in clouds.  ... 
doi:10.1587/transcom.2015adi0002 fatcat:xxg4zhwq7jhxpnm44xpvdksikq

Building Blocks for Identity Federations [chapter]

Johannes Meinecke, Martin Nussbaumer, Martin Gaedke
2005 Lecture Notes in Computer Science  
Technologies like XML and Web Services have posed new requirements to authentication, authorization and identity management for the Web as an application platform.  ...  This can be achieved by extracting the core concepts from the emerging Federation technologies and specifications and formalize them to an extent that they can be used as a foundation for configurable  ...  System Support by idFS As a technological infrastructure for supporting Web-service-based architectures in correspondence to the Federated Identity Model (FIM), we developed the Identity Federation System  ... 
doi:10.1007/11531371_29 fatcat:j7ofefuivjfjtbytlmv7x2pcxm

Service-Oriented Models for Educational Resource Federations

Daniel R. Rehak, Nick Nicholas, Nigel Ward
2009 D-Lib Magazine  
These services can be used by other systems directly, integrating the resource federation into their scope, e.g., imbedding the resource federation publishing service in an authoring tool.  ...  The resource federation model includes the processes listed in the table below (for brevity, system management processes are omitted).  ... 
doi:10.1045/november2009-rehak fatcat:5b5rcjpjufha5o2o5f7k4stcke

A modeling approach to federated identity and access management

Martin Gaedke, Johannes Meinecke, Martin Nussbaumer
2005 Special interest tracks and posters of the 14th international conference on World Wide Web - WWW '05  
Modern architectures have to control access not only to single, isolated systems, but to whole business-spanning federations of applications and services.  ...  As an approach to such problems, in this paper, we introduce a solution catalogue of reusable building blocks for Identity and Access Management (IAM).  ...  FIM -FEDERATED IDENTITY MODEL In order to provide notations for modeling the IAM infrastructure on an abstract level, we developed the Federated Identity Model (FIM).  ... 
doi:10.1145/1062745.1062916 dblp:conf/www/GaedkeMN05 fatcat:epoxvxumvre5npalxjwsg4jpua

Mathematical model of evaluating the quality of "smart city" transport interchanges functioning

Margarita Panteleeva, Svetlana Borozdina, A. Volkov, A. Pustovgar, T. Sultanov, A. Adamtsevich
2019 E3S Web of Conferences  
Thus, the authors of the article developed a mathematical model for evaluating the efficiency of transport interchanges in the general system of transport development in the Russian Federation, taking  ...  The analysis of government policy documents conducted by the authors allowed to establish that the Russian Federation Transport System Development Strategy until 2020, developed back in 2004, does not  ...  into a "smart city" and recommendations for the development and implementation of an effective state economic policy in this direction, the authors of the article have developed a mathematical model for  ... 
doi:10.1051/e3sconf/20199701006 fatcat:ckmsw2gsm5e7ngha6fupt7qppm

Self-adaptive federated authorization infrastructures

Christopher Bailey, David W. Chadwick, Rogério de Lemos
2014 Journal of computer and system sciences (Print)  
act upon assets of an authorization infrastructure for changing its configuration.  ...  Authorization infrastructures are an integral part of any network where resources need to be protected. They act as the gateway for providing (or denying) subjects (users) access to resources.  ...  : FCOMP-01-0124-FEDER-012983, and an EPSRC grant for studentship.  ... 
doi:10.1016/j.jcss.2014.02.003 fatcat:5x76xblon5dlrcwxsswu6oisfa

Agent-based modelling of interdependent critical infrastructures

E. Casalicchio, E. Galli, S. Tucci
2010 International Journal of System of Systems Engineering  
Federated-ABMS provides a formalism to model compound complex systems, composed of interacting systems, as federation of interacting agents and sector specific simulation models.  ...  This research, part of the CRESCO project, deal with the problem of interdependent critical infrastructures analysis, proposing an agent-based modelling and simulation solution.  ...  Authors are solely responsible for the views, results and conclusions contained in this work. A special acknowledgement goes to S. Ruzzante, A. Tofani, V. Fioriti and S.  ... 
doi:10.1504/ijsse.2010.035381 fatcat:vlip32hb2vgehcqdheeyi6yvri
« Previous Showing results 1 — 15 out of 755,721 results