A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
B-DAC: A Decentralized Access Control Framework on Northbound Interface for Securing SDN Using Blockchain
[article]
2021
arXiv
pre-print
To address such limitations, we introduce B-DAC, a blockchain-based framework for decentralized authentication and fine-grained access control for the Northbound interface to assist administrators in managing ...
Software-Defined Network (SDN) is a new arising terminology of network architecture with outstanding features of orchestration by decoupling the control plane and the data plane in each network element ...
ACKNOWLEDGMENT The authors would like to express the special thanks of gratitude to all astoundingly supportive members in E8.1 room as well as friends, teachers who gave us the opportunity to do this ...
arXiv:2111.00707v1
fatcat:bc7k3nqptfhmvbuigv3v2pbony
Embedded instrumentation systems architecture
2007
Defense Transformation and Net-Centric Systems 2007
methodology in the areas of system testing, monitoring, diagnostics and health management, as well as protection in control. ...
It explains how EISA offers a metadata-driven methodology for heterogeneous data collection and aggregation in a synchronized and timecorrelated fashion. ...
Acknowledgments The author would like to thank the Test Resource Management Center (TRMC) Test and Evaluation/ Science and Technology (T&E/S&T) Program for their support. ...
doi:10.1117/12.717585
fatcat:d37pvdnalfebfp6l4e7gmij3x4
Embedded Instrumentation Systems Architecture
2008
2008 IEEE Instrumentation and Measurement Technology Conference
methodology in the areas of system testing, monitoring, diagnostics and health management, as well as protection in control. ...
It explains how EISA offers a metadata-driven methodology for heterogeneous data collection and aggregation in a synchronized and timecorrelated fashion. ...
Acknowledgments The author would like to thank the Test Resource Management Center (TRMC) Test and Evaluation/ Science and Technology (T&E/S&T) Program for their support. ...
doi:10.1109/imtc.2008.4547209
fatcat:wl4cxc2jynd5fn3gf7yji3zab4
The Comparative Analysis of Main Access Control Technologies
2012
Physics Procedia
Effective access control security design is an important precondition for the stable running of an information system. -designed security mechanism to ensure the security of the system. ...
The security attributes are assigned ecurity attributes. The basic principle is acyclic information flow based on grid. Each subject in system will be assigned rite lower data. ...
That means data can only flow from low security level to high security level. Any actions break the rules will be forbidden. ...
doi:10.1016/j.phpro.2012.05.200
fatcat:h5lhp4eqozapln47dnpje6uuve
Security models for web-based applications
2001
Communications of the ACM
Many of these applications are supported by workflow management systems (WFMSs) [1] . ...
Typically, a Web-based application can be represented as a three-tier architecture, depicted in the fig-ure, which includes a Web client, network servers, and a back-end information system supported by ...
Many of these applications are supported by workflow management systems (WFMSs) [1] . ...
doi:10.1145/359205.359224
fatcat:vsa4ca3kabfvzeve6zp7kkg2ze
Analysis of DAC MAC RBAC Access Control based Models for Security
2014
International Journal of Computer Applications
In this, end users do not have authority to set any access control policies on files therefore it is the most restrictive access control method. It is useful in a highly secured environment. ...
Access control defines a set of conditions or criteria to access the system and its resources. ...
But in the DAC user rights of data plays an important part, are not a good and in MAC, users have to take security clearances and objects need security classifications. ...
doi:10.5120/18196-9115
fatcat:lrkjpwdnd5gw5hmgaath2m4lle
D9.5 Report On Implementation Of Elsi And Policy Consideration For Controlled Access Data
2018
Zenodo
It provides technical extension to the permanent archive for all types of controlled access data, the European Genome-phenome Archive (EGA), that will support genomic information deposition, data management ...
This report focuses on describing the improvement on the EGA processes that support the use of controlled data access protocol and compliance to the ELIXIR ELSI Policy and the European General Data Protection ...
The original data itself is permanently
stored in an encrypted format on the Service Provider's managed secure data storage
system. ...
doi:10.5281/zenodo.1452469
fatcat:corhqvmkbrgvrew43cg27sjn2m
GA4GH Passport standard for digital identity and access permissions
2021
Cell Genomics
Highlights d The GA4GH Passport is an open standard to encode data access permissions of users d The standard enables communication of data access permissions at international scale d Passport facilitates ...
data access and analysis across international platforms d Implementers include research initiatives, infrastructures, and national institutes ...
The DAC approves a DAR and issues a ControlledAccessGrants visa to communicate that approval to the data management system. ...
doi:10.1016/j.xgen.2021.100030
fatcat:idfx5dtwhncbtdzurl5at47t4m
Mandatory Access Control Method for Windows Embedded OS Security
2021
Electronics
Our results indicate that the existing DAC-based security systems could be neutralized if a principal's security policy is removed. ...
In this study, we propose a system that improves the security of the Windows Embedded OS by applying a mandatory access control (MAC) policy in which the access rights of objects, such as files and folders ...
The proposed MAC-based security system was implemented as a file system filter driver, and the security policy was managed by the filter driver kernel memory and the file system's alternate data stream ...
doi:10.3390/electronics10202478
fatcat:vpsbl7sjxbeevd62v63w7vsupu
A Survey of Access Control and Data Encryption for Database Security
2017
journal of King Abdulaziz University Engineering Sciences
With the vast amount of data generated nowadays, organizing and managing of these data are very important to allow the users to access, retrieve, and update their data by using database systems (DBS). ...
This paper discusses two techniques used in the DB field to achieve integrity and confidentiality of the data, by using access control policies and data encryption. ...
The protection of data is accomplished with different aspects of a database management system (DBMS) [7] . ...
doi:10.4197/eng.28-1.2
fatcat:jyx3ic6ofbgc7idepjnrx2cyby
D4.2 Bigdataocean Platform Architecture, Components Design And Apis - V1.00
2018
Zenodo
On the top of the data storage, BigDataOcean will also provide a data management tool capable of supporting maritime data sources harmonisation named Ontario. ...
DC-TR-2 The system should be able to curate large scale (big data) datasets in a timely and efficient manner. DS-TR-1 The system should be able to store and manage large datasets (big data). ...
doi:10.5281/zenodo.1249386
fatcat:q4ozrm5awnhjxfi7jifmwkmykq
From Conventional to State-of-the-Art IoT Access Control Models
2020
Electronics
The survey provides a review of the requirements for access control enforcement, discusses several security issues in access control, and elaborates underlying principles and limitations of famous access ...
Access control refers to a process which can restrict user's access to data and resources. It enforces access rules to grant authorized users an access to resources and prevent others. ...
Acknowledgments: The authors acknowledge with thanks Deanship of Scientific Research (DSR), King Abdulaziz University, Jeddah, Saudi Arabia for technical and financial support. ...
doi:10.3390/electronics9101693
fatcat:mtvlbubbyvbx5ph2bnfwnmlbqa
Study and Analysis of Different Database Threats and Basic Access Control Models
2017
INTERNATIONAL JOURNAL OF APPLIED RESEARCH AND TECHNOLOGY
The database security system has been developing a number of access control policies for assuring data confidentiality, integrity and availability. ...
We review the key access control policies such as Mandatory Access Control policy (MAC), Discretionary Access Control Policy (DAC), and Role Based Access Control Policy (RBAC), we also perform a comparative ...
Discretionary access control In DAC models, all the subjects and objects in a system are identified and the access authorization rules are specified for each subject and object in the system. ...
doi:10.24163/ijart/2017/2(3):181-189
fatcat:dll5ww55knezzlzimxqmutpyrm
Analysis of Different Access Control Mechanism in Cloud
2012
International Journal of Applied Information Systems
Providing security to the data stored in cloud is the major concern. So Security can be enhanced by providing access control to the authorized users. ...
Access control can be enabled in most of the computing environment such as Peer to Peer, Grid and Cloud. Cloud storage services are accessed through a cloud storage gateway. ...
In DAC the flow of information will not be proper but in MAC it is controlled based on the security level assigned and also it assigns security clearance to each user. ...
doi:10.5120/ijais12-450660
fatcat:cxqpx4fg5jhfnnpqkrkkhwoply
Digital government security infrastructure design challenges
2001
Computer
Acknowledgment This study is supported, in part, by a grant from the Center for Education and Research in Information Assurance and Security at Purdue. ...
Policy neutrality avoids restricting security implementations to DAC or MAC. Rather, a policy-neutral model supports arbitrary user-defined policies. ...
, and applications, which can include database federations, multilevel secure database management systems, and multilevel secure operated systems. 7 Several security policies in a multidomain environment ...
doi:10.1109/2.901169
fatcat:jrf2e6nrarbmpnwknthcvvcvsy
« Previous
Showing results 1 — 15 out of 5,672 results