Filters








812 Hits in 8.1 sec

Enforcing fine-grained access control for secure collaborative modelling using bidirectional transformations

Csaba Debreceni, Gábor Bergmann, István Ráth, Dániel Varró
2017 Journal of Software and Systems Modeling  
We propose a secure collaborative modelling approach where fine-grained access control for models is strictly enforced by bidirectional model transformations.  ...  Collaborators obtain filtered local copies of the model containing only those model elements which they are allowed to read; write access control policies are checked on the server upon submitting model  ...  In Sect. 4, we overview our bidirectional model transformation for access control, while Sect. 5 describes our secure collaboration schema and proves its correctness.  ... 
doi:10.1007/s10270-017-0631-8 fatcat:lnmjwo4tbfautlyxxqv6lvlw7q

Advanced Techniques and Tools for Secure Collaborative Modeling

Csaba Debreceni
2017 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems  
design artifacts need to be protected by access control policies.  ...  My research focuses on developing (i) a general secure collaboration scheme that guarantees that high-level access control policies are respected during collaboration and it can be integrated into existing  ...  ACKNOWLEDGEMENT I would like to thank my advisor, Daniel Varro for his guidance during my research.  ... 
dblp:conf/models/Debreceni17 fatcat:nfamcsaxsvb73kdhv52w5bnxvu

Query-based access control for secure collaborative modeling using bidirectional transformations*

Gábor Bergmann, Csaba Debreceni, István Ráth, Dániel Varró
2016 Proceedings of the ACM/IEEE 19th International Conference on Model Driven Engineering Languages and Systems - MODELS '16  
We propose a technique for secure collaborative modeling where (1) fine-grained access control for models can be defined by model queries, and (2) such access control policies are strictly enforced by  ...  bidirectional model transformations.  ...  In this paper, we propose a query-based approach for modeling fine-grained access control policies, and define bidirectional model transformations to derive filtered views for each collaborator and to  ... 
doi:10.1145/2976767.2976793 fatcat:t4xrefttmbchbmfd5p62lirha4

Agile Network Access Control in the Container Age

Cornelius Diekmann, Johannes Naab, Andreas Korsten, Georg Carle
2018 IEEE Transactions on Network and Service Management  
Apart from coarse-grained separation of virtual networks, Docker neither supports the application developer to specify nor the network operators to enforce fine-grained network access control between containers  ...  However, the fundamental security primitive of network access control for a distributed microservice deployment is often ignored or left to the network operations team.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their valuable feedback. This work was supported by the German Federal Ministry of Education and Research  ... 
doi:10.1109/tnsm.2018.2889009 fatcat:zwrjmvyvi5hv5fa5impjeq4try

Flexible end-to-end content security in CCN

Christopher A. Wood, Ersin Uzun
2014 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)  
Our design provides strong end-to-end content security and reduces the number of protocol messages required for user authentication and key retrieval.  ...  In this paper, we present a secure content distribution architecture for CCN that is based on proxy re-encryption.  ...  For the purpose of individualizing content, attribute-based encryption techniques show great promise [3] , [14] for enforcing fine-grained access control to content stored in a public location.  ... 
doi:10.1109/ccnc.2014.6940528 fatcat:5q4jrxvdlja35lcmrzm57pr33i

Flexible end-to-end content security in CCN

Christopher Wood, Ersin Uzun
2014 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)  
Our design provides strong end-to-end content security and reduces the number of protocol messages required for user authentication and key retrieval.  ...  In this paper, we present a secure content distribution architecture for CCN that is based on proxy re-encryption.  ...  For the purpose of individualizing content, attribute-based encryption techniques show great promise [3] , [14] for enforcing fine-grained access control to content stored in a public location.  ... 
doi:10.1109/ccnc.2014.6994401 fatcat:tqqb3cua3fcu3n6qbgxwmypbuu

Behavior-based Attestation of Policy Enforcement among Trusted Virtual Domains

Rong-wei Yu, Fan Yin, Jin Ke, Lina Wang
2010 Journal of Networks  
According to behavior compliance, this paper proposes a behavior-based attestation of policy enforcement for distributed services in trusted virtual machine, which is adapted to trusted virtual domain.  ...  In our attestation, the unified behavior of the policy model is attested rather than that of any individual security policy.  ...  Usage CONtrol (UCON) model is a new fine-grained access control model beyond traditional access control, which includes such two advantages as continuity of access decision and mutability of attributes  ... 
doi:10.4304/jnw.5.6.642-649 fatcat:5uwp4nt4rjfgpfqu64knemztwe

D1.2 System Architecture Definition

Srdjan Skrbic
2021 Zenodo  
The COLLABS project aims at developing, demonstrating and supporting a comprehensive cyberintelligence framework for collaborative manufacturing, which enables the secure data exchange across the digital  ...  These goals will be achieved using state-of-the-art technologies and making significant scientific and technological advances in several key relevant domains, including secure multi-party computations  ...  These high-level objectives are detailed with KPIs that can be found in section 1.1.2 of the proposal and will be formalized for real success measurement in WP6.  ... 
doi:10.5281/zenodo.5347678 fatcat:4jr4tibrurasfnbl23huny3xkq

A Survey on Trust Aware Security and Scheduling in Traditional and Ad Hoc Grids

Slavomír Kavecký, Penka Martincová
2016 International Journal of Computer Applications  
The ad hoc grid infrastructure was proposed as a consequence of the need for the short-term collaborations.  ...  However, for a transient community that is interested only in short-term or one-time collaborations the establishment of a traditional grid environment can become too cumbersome.  ...  With the growth of grid popularity the enforcement of access control based only on user's identity become insufficient and more fine-grained access control was necessary.  ... 
doi:10.5120/ijca2016908058 fatcat:bkozltovx5b3xbmtu7kudonmqq

Autonomic Response to Distributed Denial of Service Attacks [chapter]

Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley Holliday, Travis Reid
2001 Lecture Notes in Computer Science  
Acknowledgements The authors would like to thank Jack Oden for distilling and Mary Ellen Leishear for editing the original report into this article.  ...  Acknowledgments The authors would like to acknowledge the valuable suggestions of the anonymous reviewers.  ...  It provides fine-grained access control of distributed object messaging occurring across enclave boundaries.  ... 
doi:10.1007/3-540-45474-8_9 fatcat:gzimnj7tqvd5zg2zl7pjxkhtzm

Playing with machines: Using machine learning to understand automated copyright enforcement at scale

Joanne E Gray, Nicolas P Suzor
2020 Big Data & Society  
We use this to explore, in a granular way, how copyright is enforced on YouTube, using both statistical methods and qualitative analysis of our categorised dataset.  ...  Using a dataset of 76.7 million YouTube videos, we explore how digital and computational methods can be leveraged to better understand content moderation and copyright enforcement at a large scale.We used  ...  Acknowledgements We thank Rosalie Gillett for outstanding research assistance.  ... 
doi:10.1177/2053951720919963 fatcat:f2khh3yjdzenhkgmdnfwn26ysa

Location Authentication, Tracking, and Emergency Signaling through Power Line Communication: Designs and Protocols for New Out-of-Band Strategies

Alan T. Sherman, Dhananjay Phatak, Vivek G. Relan, Bhushan Sonawane
2012 Cryptologia  
Acknowledgments Phatak suggested the idea of using PLC for location authentication.  ...  We are grateful to Rick Carback, Russ Fink, Yordan Kostov, Tim Leschke, Chintan Patel, John Pinkston, and the reviewers for helpful comments.  ...  enforcement to collaborate an alibi that the user was at home at a certain time.  ... 
doi:10.1080/01611194.2012.660370 fatcat:5qk2waq2jvannjxbalpes2rxfe

Secure Edge Computing with Lightweight Control-Flow Property-based Attestation

Nikos Koutroumpouchos, Christoforos Ntantogian, Sofia-Anna Menesidou, Kaitai Liang, Panagiotis Gouvas, Christos Xenakis, Thanassis Giannetsos
2019 2019 IEEE Conference on Network Softwarization (NetSoft)  
In the face of an increasing attack landscape, it is necessary to cater for the provision of efficient mechanisms to collectively verify software-and deviceintegrity in order to detect run-time modifications  ...  It is a first step towards a new line of security mechanisms that enables the provision of control-flow attestation of only those specific, critical software components that are comparatively small, simple  ...  Policy-Based Access Control (PBAC) [32] is an access control model based on policy-based security management, which controls the access to resources by defining the rules and policies.  ... 
doi:10.1109/netsoft.2019.8806658 dblp:conf/netsoft/Koutroumpouchos19 fatcat:fqxbdi4m5jdwfaf5srmlllhy3u

Interest-Based Negotiation for Policy-Regulated Asset Sharing [chapter]

Christos Parizas, Geeth De Mel, Alun D. Preece, Murat Sensoy, Seraphin B. Calo, Tien Pham
2016 Lecture Notes in Computer Science  
The problem is exacerbated in a coalition context due to policy constraints, that reflect concerns regarding security, privacy and performance to name a few, placed on the resources.  ...  Interest-based negotiation, promotes collaboration when compared with the traditional, position-based negotiation approaches.  ...  The US and UK Governments are authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation hereon.  ... 
doi:10.1007/978-3-319-42691-4_17 fatcat:6w2wb5phhfgkdditg2rvowppaq

Building the National Radio Recordings Database: A Big Data Approach to Documenting Audio Heritage [article]

Emily Goodmann, Mark A. Matienzo, Shawn VanCour, William Vanden Dries
2019 arXiv   pre-print
This paper traces strategies used by the Radio Preservation Task Force of the Library of Congress's National Recording Preservation Board to develop a publicly searchable database documenting extant radio  ...  As the project continues to expand and evolve, lessons from its early development offer valuable reminders of the human judgment, hidden labor, and interpersonal relations required for successful big data  ...  A second reason is the ongoing development of ArcLight [11] , an extension to Blacklight offering options for more fine-grained, hierarchically ordered archival description below the collection level.  ... 
arXiv:1911.04625v1 fatcat:ki4m3h66fbgytf6cnc2t5mejfy
« Previous Showing results 1 — 15 out of 812 results