Filters








11,815 Hits in 3.7 sec

Independently Verifiable Decentralized Role-Based Delegation

Roberto Tamassia, Danfeng Yao, William H. Winsborough
2010 IEEE transactions on systems, man and cybernetics. Part A. Systems and humans  
We present an independently-verifiable delegation mechanism, where a delegation credential can be verified without the participation of domain administrators.  ...  RBCD enables a role member to create delegations based on the dynamic needs of collaboration, yet in the meantime a delegation chain can be verified by anyone without the participation of role administrators  ...  We give the definition for independently-verifiable decentralized role-based delegation as follows. 3) [Independently-verifiable] Given the public key associated with Domain 1 , the delegation credential  ... 
doi:10.1109/tsmca.2010.2045118 fatcat:3chetexsuzgmrht2rgvefyfkgy

Role Based Cascaded Delegation using HCBE in Cloud

Nirmalrani V
2019 Zenodo  
In independently verifiable delegation mechanism, delegation credential can be verified without the participation of domain administrators this protocol is called Role-Based Cascaded Delegation (RBCD),  ...  To address this problem, the Measurable Risk Adaptive Decentralized Role-based Delegation framework is used.  ...  RBCD enables a role member to create delegations based on the dynamic needs of collaboration. Delegation chain can also be verified by anyone without the participation of role administrators.  ... 
doi:10.5281/zenodo.2599961 fatcat:v6lxvqfannbrlfdjcychwecq6q

Role-based cascaded delegation

Roberto Tamassia, Danfeng Yao, William H. Winsborough
2004 Proceedings of the ninth ACM symposium on Access control models and technologies - SACMAT '04  
We propose role-based cascaded delegation, a model for delegation of authority in decentralized trust management systems.  ...  We show that role-based cascaded delegation combines the advantages of role-based trust management with those of cascaded delegation.  ...  Role-based cascaded delegation We propose an alternative model for the delegation of authority in role-based decentralized trust management systems, called role-based cascaded delegation.  ... 
doi:10.1145/990036.990061 dblp:conf/sacmat/TamassiaYW04 fatcat:gapcnglguvacljdgoa2u7eicpm

BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT

Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen
2018 Computers  
A federated capability-based delegation model (FCDM) is introduced to support hierarchical and multi-hop delegation. The mechanism for delegate authorization and revocation is explored.  ...  Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient  ...  Although a rule-based framework for role-based delegation and revocation was proposed [34] , the proposal cannot support Capability-based Access Control systems.  ... 
doi:10.3390/computers7030039 fatcat:gs5bc3ojmbexpb2lkhigisphza

Protecting Information Sharing in Distributed Collaborative Environment [chapter]

Min Li, Hua Wang
2008 Lecture Notes in Computer Science  
The motivation of role-based delegation and revocation are that users themselves may delegate role authorities to others to process some authorized functions and later remove the authorities.  ...  Role-based delegation and revocation models will be developed with comparisons to established technical analysis, laboratory experiments, support hierarchical roles and multistep delegation.  ...  [11] studied various problems of revoking in an ownership-based framework, but their attempt was still not sufficient to model all the revocations required in role-based delegation, for example, grant-independent  ... 
doi:10.1007/978-3-540-89376-9_19 fatcat:knrcmshzcbe65ogzfn3mcjxzly

Review of Decentralization in the Bank's Business Practices in Kermanshah Province

Gholam Reza Zardashty
2014 Kuwait Chapter of Arabian Journal of Business and Management Review  
and decentralization of organization.  ...  Managing today's large and complex organizations is facing various problems and a variety of activities, it seems impossible without delegating some powers to lower levels of management as well as creating  ...  -Establishment of a decentralized system can lead to independence and greater freedom in work.  ... 
doi:10.12816/0018676 fatcat:fcfgqmeo75djnoeub2wa5n5qly

A Framework for Managing Access of Large-Scale Distributed Resources in a Collaborative Platform

Su Chen, Tiejian Luo, Wei Liu, Jinliang Song, Feng Gao
2008 Data Science Journal  
We propose an extensible access management framework to meet this requirement by supporting an administrative delegation policy.  ...  This feature allows administrators on the platform to make new policies based on the original policies made by resources owners.  ...  Notable among them is the Role-based Trust Management framework (Li, Mitchell, & Winsborough, 2002) , which merges TM and Role-based Access Control (RBAC).  ... 
doi:10.2481/dsj.7.137 fatcat:sjscolwlurhrzdmzudiqqqzsmi

Security in the dutch electronic patient record system

Guido van't Noordende
2010 Proceedings of the second annual workshop on Security and privacy in medical and home-care systems - SPIMACS '10  
Patient records are stored decentrally, while a central component takes care of authentication and authorization of health professionals and of the mechanics required for exchanging patient records.  ...  This information is used by the EPD for (role-based) access control.  ...  An authorization service (AUT, Fig. 1 .1) located in the LSP takes care of authentication requests and enforcing (role-based) access control rules.  ... 
doi:10.1145/1866914.1866918 fatcat:hi2la4e2prd37jh7izsoz6y35i

Blockchain-Based DNS Root Zone Management Decentralization for Internet of Things

Yu Zhang, Wenfeng Liu, Zhongda Xia, Zhongze Wang, Lu Liu, Weizhe Zhang, Hongli Zhang, Binxing Fang, Hongju Cheng
2021 Wireless Communications and Mobile Computing  
On the basis of maintaining the single root authority for top-level domain (TLD), RootChain decentralizes TLD data publication by empowering delegated TLD authorities to publish authenticated data directly  ...  Towards distributed root zone operation in DNS, this paper presents a blockchain-based root operation architecture—RootChain, composed of multiple root servers.  ...  RootChain retains the current DNS namespace and does not change the root zone authority for TLD delegation. Blockchain-Based DNS Decentralization Solutions.  ... 
doi:10.1155/2021/6620236 fatcat:jzegy6wbufffdguduzsvmyzxpi

The role of decentralization for balancing employee performance in governmental universities in Jordan

Salameh S. Al-Nawafah, Mohammad Nassar Almarshad
2020 Management Science Letters  
Decrease Role Conflict, Decrease Role Ambiguity, Support Leadership and Employee Empowerment).  ...  The present study aimed at examining the influence of adopting decentralization within organization and its role in creating a balanced performance through influencing variables of (Organize Workload,  ...  Study Model Independent Variables Dependent variable Decentralization Organize Workload Decrease Role Conflict Balanced Performance Decrease Role Ambiguity Support Leadership Employee Empowerment  ... 
doi:10.5267/j.msl.2020.6.017 fatcat:3ej57g7udzfuvjjgro5g3zuaue

Decentralizing democracy: approaches to consensus within blockchain communities

Christopher Tozzi
2019 Revista Teknokultura  
Creating fair, transparent and genuinely democratic modes of decentralized decision-making has been a key concern for many developers and users of blockchains.  ...  This article evaluates several popular methods of maintaining consensus and achieving decentralized decision-making on blockchain networks in order to assess the extent to which blockchains challenge the  ...  Instead, delegates are theoretically selected based on the decentralized network's faith in their ability to maintain consensus effectively.  ... 
doi:10.5209/tekn.64523 fatcat:anokfvizhfg27ohlbzphghkmam

A Two-stage Autonomous EV Charging Coordination Method Enabled by Blockchain

Jian Ping, Zheng Yan, Sijie Chen
2021 Journal of Modern Power Systems and Clean Energy  
A decentralized algorithm based on the alternating direction method of multipliers (ADMM) is proposed to protect individual privacy.  ...  The structure of the blockchain-based system is shown in Fig. 3 , where a set of CSs (named as delegates) plays the role of a central coordinator.  ...  In the upper layer, the delegates play the role of the coordinator besides their own roles as CSs, i.e., solving the upper problems and communicating with CSs and a DSO.  ... 
doi:10.35833/mpce.2019.000139 fatcat:iswbus5ukvf5hkuvjmfaokjzuy

Overview of Blockchain

Akshay S. Gaikwad
2020 International Journal for Research in Applied Science and Engineering Technology  
Blockchain allows the participants to verify the transactions independently. This paper explains the concept of blockchain, characteristics, how blockchain works, and its security mechanisms.  ...  It attempts to highlights role of Blockchain in various fields. Key aspects: Improved accuracy by removing human involvement in verification.  ...  If transaction is faulty, it de-listed the leader or delegate from the list of delegates and other user is added to the list based on votes of other users.  ... 
doi:10.22214/ijraset.2020.6364 fatcat:v7osnkikkrftpn7hrzdtyc3q2q

Requirements for scalable access control and security management architectures

Angelos D. Keromytis, Jonathan M. Smith
2007 ACM Transactions on Internet Technology  
Maximizing local autonomy by delegating functionality to end nodes when possible (the "end to end" design principle) has led to a scalable Internet.  ...  With this paper, we hope to influence the design of future access-control systems towards more decentralized and scalable mechanisms.  ...  Role-based Access Control 3 (RBAC) [Ferraiolo and amd S.  ... 
doi:10.1145/1239971.1239972 fatcat:y4qamkb24jcslmbtm6topumm6e

UniqueID: Decentralized Proof-of-Unique-Human [article]

MohammadJavad Hajialikhani, MohammadMahdi Jahanara
2018 arXiv   pre-print
Extending decentralization to the human identity concept, we can think of using blockchain for creating a list of verified human identities with a one-person-one-ID property.  ...  Bitcoin and Ethereum are novel mechanisms for decentralizing the concept of money and computation.  ...  We think that designing efficient, fair and decentralized consensus protocols based on a one-human-one-vote basis is an interesting and independent challenge. B.  ... 
arXiv:1806.07583v1 fatcat:7p2xeqmkwrcgxbgpxbq43nss7u
« Previous Showing results 1 — 15 out of 11,815 results