Filters








5,672 Hits in 4.5 sec

B-DAC: A Decentralized Access Control Framework on Northbound Interface for Securing SDN Using Blockchain [article]

Phan The Duy, Hien Do Hoang, Do Thi Thu Hien, Anh Gia-Tuan Nguyen, Van-Hau Pham
2021 arXiv   pre-print
To address such limitations, we introduce B-DAC, a blockchain-based framework for decentralized authentication and fine-grained access control for the Northbound interface to assist administrators in managing  ...  Software-Defined Network (SDN) is a new arising terminology of network architecture with outstanding features of orchestration by decoupling the control plane and the data plane in each network element  ...  ACKNOWLEDGMENT The authors would like to express the special thanks of gratitude to all astoundingly supportive members in E8.1 room as well as friends, teachers who gave us the opportunity to do this  ... 
arXiv:2111.00707v1 fatcat:bc7k3nqptfhmvbuigv3v2pbony

Embedded instrumentation systems architecture

Nikita A. Visnevski, Raja Suresh
2007 Defense Transformation and Net-Centric Systems 2007  
methodology in the areas of system testing, monitoring, diagnostics and health management, as well as protection in control.  ...  It explains how EISA offers a metadata-driven methodology for heterogeneous data collection and aggregation in a synchronized and timecorrelated fashion.  ...  Acknowledgments The author would like to thank the Test Resource Management Center (TRMC) Test and Evaluation/ Science and Technology (T&E/S&T) Program for their support.  ... 
doi:10.1117/12.717585 fatcat:d37pvdnalfebfp6l4e7gmij3x4

Embedded Instrumentation Systems Architecture

Nikita Visnevski
2008 2008 IEEE Instrumentation and Measurement Technology Conference  
methodology in the areas of system testing, monitoring, diagnostics and health management, as well as protection in control.  ...  It explains how EISA offers a metadata-driven methodology for heterogeneous data collection and aggregation in a synchronized and timecorrelated fashion.  ...  Acknowledgments The author would like to thank the Test Resource Management Center (TRMC) Test and Evaluation/ Science and Technology (T&E/S&T) Program for their support.  ... 
doi:10.1109/imtc.2008.4547209 fatcat:wl4cxc2jynd5fn3gf7yji3zab4

The Comparative Analysis of Main Access Control Technologies

Su Zhang, Li Niu, Jing Chen
2012 Physics Procedia  
Effective access control security design is an important precondition for the stable running of an information system. -designed security mechanism to ensure the security of the system.  ...  The security attributes are assigned ecurity attributes. The basic principle is acyclic information flow based on grid. Each subject in system will be assigned rite lower data.  ...  That means data can only flow from low security level to high security level. Any actions break the rules will be forbidden.  ... 
doi:10.1016/j.phpro.2012.05.200 fatcat:h5lhp4eqozapln47dnpje6uuve

Security models for web-based applications

James B. D. Joshi, Walid G. Aref, Arif Ghafoor, Eugene H. Spafford
2001 Communications of the ACM  
Many of these applications are supported by workflow management systems (WFMSs) [1] .  ...  Typically, a Web-based application can be represented as a three-tier architecture, depicted in the fig-ure, which includes a Web client, network servers, and a back-end information system supported by  ...  Many of these applications are supported by workflow management systems (WFMSs) [1] .  ... 
doi:10.1145/359205.359224 fatcat:vsa4ca3kabfvzeve6zp7kkg2ze

Analysis of DAC MAC RBAC Access Control based Models for Security

Bokefode Jayant.D, Ubale Swapnaja A, Apte Sulabha S, Modani Dattatray G
2014 International Journal of Computer Applications  
In this, end users do not have authority to set any access control policies on files therefore it is the most restrictive access control method. It is useful in a highly secured environment.  ...  Access control defines a set of conditions or criteria to access the system and its resources.  ...  But in the DAC user rights of data plays an important part, are not a good and in MAC, users have to take security clearances and objects need security classifications.  ... 
doi:10.5120/18196-9115 fatcat:lrkjpwdnd5gw5hmgaath2m4lle

D9.5 Report On Implementation Of Elsi And Policy Consideration For Controlled Access Data

Dylan Spalding, Jordi Rambla, Juha Törnroos, Jaakko Leinonen, Mikael Linden, Human Data Community
2018 Zenodo  
It provides technical extension to the permanent archive for all types of controlled access data, the European Genome-phenome Archive (EGA), that will support genomic information deposition, data management  ...  This report focuses on describing the improvement on the EGA processes that support the use of controlled data access protocol and compliance to the ELIXIR ELSI Policy and the European General Data Protection  ...  The original data itself is permanently stored in an encrypted format on the Service Provider's managed secure data storage system.  ... 
doi:10.5281/zenodo.1452469 fatcat:corhqvmkbrgvrew43cg27sjn2m

GA4GH Passport standard for digital identity and access permissions

Craig Voisin, Mikael Linden, Stephanie O.M. Dyke, Sarion R. Bowers, Pinar Alper, Maxmillian P. Barkley, David Bernick, Jianpeng Chao, Mélanie Courtot, Francis Jeanson, Melissa A. Konopko, Martin Kuba (+12 others)
2021 Cell Genomics  
Highlights d The GA4GH Passport is an open standard to encode data access permissions of users d The standard enables communication of data access permissions at international scale d Passport facilitates  ...  data access and analysis across international platforms d Implementers include research initiatives, infrastructures, and national institutes  ...  The DAC approves a DAR and issues a ControlledAccessGrants visa to communicate that approval to the data management system.  ... 
doi:10.1016/j.xgen.2021.100030 fatcat:idfx5dtwhncbtdzurl5at47t4m

Mandatory Access Control Method for Windows Embedded OS Security

Chaeho Cho, Yeonsang Seong, Yoojae Won
2021 Electronics  
Our results indicate that the existing DAC-based security systems could be neutralized if a principal's security policy is removed.  ...  In this study, we propose a system that improves the security of the Windows Embedded OS by applying a mandatory access control (MAC) policy in which the access rights of objects, such as files and folders  ...  The proposed MAC-based security system was implemented as a file system filter driver, and the security policy was managed by the filter driver kernel memory and the file system's alternate data stream  ... 
doi:10.3390/electronics10202478 fatcat:vpsbl7sjxbeevd62v63w7vsupu

A Survey of Access Control and Data Encryption for Database Security

Emad F. Khalaf Emad F. Khalaf
2017 journal of King Abdulaziz University Engineering Sciences  
With the vast amount of data generated nowadays, organizing and managing of these data are very important to allow the users to access, retrieve, and update their data by using database systems (DBS).  ...  This paper discusses two techniques used in the DB field to achieve integrity and confidentiality of the data, by using access control policies and data encryption.  ...  The protection of data is accomplished with different aspects of a database management system (DBMS) [7] .  ... 
doi:10.4197/eng.28-1.2 fatcat:jyx3ic6ofbgc7idepjnrx2cyby

D4.2 Bigdataocean Platform Architecture, Components Design And Apis - V1.00

Project Consortium Members
2018 Zenodo  
On the top of the data storage, BigDataOcean will also provide a data management tool capable of supporting maritime data sources harmonisation named Ontario.  ...  DC-TR-2 The system should be able to curate large scale (big data) datasets in a timely and efficient manner. DS-TR-1 The system should be able to store and manage large datasets (big data).  ... 
doi:10.5281/zenodo.1249386 fatcat:q4ozrm5awnhjxfi7jifmwkmykq

From Conventional to State-of-the-Art IoT Access Control Models

Ahmad Kamran Malik, Naina Emmanuel, Sidra Zafar, Hasan Ali Khattak, Basit Raza, Sarmadullah Khan, Ali H. Al-Bayatti, Madini O. Alassafi, Ahmed S. Alfakeeh, Mohammad A. Alqarni
2020 Electronics  
The survey provides a review of the requirements for access control enforcement, discusses several security issues in access control, and elaborates underlying principles and limitations of famous access  ...  Access control refers to a process which can restrict user's access to data and resources. It enforces access rules to grant authorized users an access to resources and prevent others.  ...  Acknowledgments: The authors acknowledge with thanks Deanship of Scientific Research (DSR), King Abdulaziz University, Jeddah, Saudi Arabia for technical and financial support.  ... 
doi:10.3390/electronics9101693 fatcat:mtvlbubbyvbx5ph2bnfwnmlbqa

Study and Analysis of Different Database Threats and Basic Access Control Models

2017 INTERNATIONAL JOURNAL OF APPLIED RESEARCH AND TECHNOLOGY  
The database security system has been developing a number of access control policies for assuring data confidentiality, integrity and availability.  ...  We review the key access control policies such as Mandatory Access Control policy (MAC), Discretionary Access Control Policy (DAC), and Role Based Access Control Policy (RBAC), we also perform a comparative  ...  Discretionary access control In DAC models, all the subjects and objects in a system are identified and the access authorization rules are specified for each subject and object in the system.  ... 
doi:10.24163/ijart/2017/2(3):181-189 fatcat:dll5ww55knezzlzimxqmutpyrm

Analysis of Different Access Control Mechanism in Cloud

Punithasurya K, Jeba Priya S
2012 International Journal of Applied Information Systems  
Providing security to the data stored in cloud is the major concern. So Security can be enhanced by providing access control to the authorized users.  ...  Access control can be enabled in most of the computing environment such as Peer to Peer, Grid and Cloud. Cloud storage services are accessed through a cloud storage gateway.  ...  In DAC the flow of information will not be proper but in MAC it is controlled based on the security level assigned and also it assigns security clearance to each user.  ... 
doi:10.5120/ijais12-450660 fatcat:cxqpx4fg5jhfnnpqkrkkhwoply

Digital government security infrastructure design challenges

J. Joshi, A. Ghafoor, W.G. Aref, E.H. Spafford
2001 Computer  
Acknowledgment This study is supported, in part, by a grant from the Center for Education and Research in Information Assurance and Security at Purdue.  ...  Policy neutrality avoids restricting security implementations to DAC or MAC. Rather, a policy-neutral model supports arbitrary user-defined policies.  ...  , and applications, which can include database federations, multilevel secure database management systems, and multilevel secure operated systems. 7 Several security policies in a multidomain environment  ... 
doi:10.1109/2.901169 fatcat:jrf2e6nrarbmpnwknthcvvcvsy
« Previous Showing results 1 — 15 out of 5,672 results