80,550 Hits in 5.9 sec

SFINKS: Secure Focused Information, News, and Knowledge Sharing

Tatyana Ryutov, Tatiana Kichkaylo, Robert Neches, Michael Orosz
2008 2008 IEEE Conference on Technologies for Homeland Security  
While traditional hierarchical information sharing approaches ensure that only relevant information is delivered to authorized nodes, the resulting organizational overhead severely impedes timely sharing  ...  Nita-Rotaru and Li [8] presented a framework for role-based access control in group communication systems.  ...  We also use the Adaptive Trust Negotiation and Access Control (ATNAC) framework [10] [11] based on two well established systems: TrustBuilder [15] and Generic Authorization and Access control API 2  ... 
doi:10.1109/ths.2008.4534486 fatcat:kygsp5i6gfhxrkpyqtomc7v5f4

A Review of fine grained access control techniques

Rakesh Shirsath, Dr K. V. Daya Sagar
2018 International Journal of Engineering & Technology  
In this paper, the issue of access control is discussed by defining traditional access policies. Attribute based access policy is analysed with its types.  ...  Therefore, an elastic access control or fine-grained access control approach for data is urgently required and becomes a challenging open problem.  ...  We surveyed different attributes based encryption (ABE) schemes used in cloud infrastructure for providing access to data on cloud.  ... 
doi:10.14419/ijet.v7i2.7.10249 fatcat:jaemco3hanhd5gpnojeojmbnsq

Survey on Access Control Mechanisms in Cloud Computing

G�zde Karataş, Akhan Akbulut
2018 Journal of Cyber Security and Mobility  
It is a critical task for end users to control access to resources because lack of control often leads to security risks. In addition, this may cause systems to fail.  ...  This paper describes seven different access control mechanisms used in cloud computing platforms for different purposes.  ...  Hierarchical Attribute Based Access Control Hierarchical Attribute Based Access Control (HABE) surfaced as a result of its usage of the features of FGAC and Ciphertext-Policy Attribute-Based Encryption  ... 
doi:10.13052/jcsm2245-1439.731 fatcat:m547cr5vovc6vdzdt64wodj52i

Fine-Grained Ranked Multi-Keyword Search over Hierarchical Data for IoT-oriented Health System

Jianfei Sun, Shengnan Hu, Xuyun Nie
2019 IEEE Access  
In this paper, to tackle these issues, we propose a fine-grained ranked multi-keyword search scheme over hierarchical data by leveraging ciphertext-policy hierarchical attribute-based encryption (CP-HABE  ...  As a potential and promising solution, attribute-based keyword search (ABKS) can provide fine-grained keyword search and access control over the encrypted data at the same time.  ...  To support hierarchical access control over encrypted hierarchical data, ciphertext-policy hierarchical attribute-based encryption (CP-HABE) schemes [8] , [9] were built. B.  ... 
doi:10.1109/access.2019.2928441 fatcat:xgg27b33ovdvha3qf2sfitnvgi

A Review on Access Control Policy and Key Generation in Data Sharing

Mr. Mangnale Gajanan K., Prof. Korde A. L., Dr R K Patil, Dr R K Sawant
2019 International Journal of Advanced Engineering Research and Science  
Also we review the different attribute based access control mechanisms used in existing systems.  ...  It consist four different attribute based encryption schemes such as KP-ABE (Key-policy attribute-based encryption), CP-ABE (ciphertext-policy attribute-based encryption), HABE (Hierarchical Attribute  ... 
doi:10.22161/ijaers.6.2.6 fatcat:jghs5et6lbhxxjgd7e2c2d2cve


M. Amsaveni
2018 International Journal of Advanced Research in Computer Science  
In order to handle implication of this study, we plan to propose an Ensemble operator on the Fine grained access control through Time, Location and Profile constrainst on the access policy to the attribute  ...  Fine grained access control is employed against encrypted data. In addition to more advantage, the access control mechanism also faces several issues in terms of automatic revocation.  ...  against the access violation is been modelled using various models is described below Hierarchical Attribute Based Access Control Mechanism In this literature, a hierarchical attribute-based access  ... 
doi:10.26483/ijarcs.v9i3.6118 fatcat:5cg7ewgzbjemtdaojlsr7mm75e

Secure Data Sharing In Cloud Computing By Implementing Amednded Attribute Based Data Sharing Scheme

M. Karthikraj
2017 International Journal Of Engineering And Computer Science  
Cipher text-Policy Attribute based Encryption (CP-ABE) is regarded as one of the most suitable technologies in cloud storage for data access control, since it gives data owners more undeviating control  ...  In the proposed system, attribute-based data sharing scheme is revisited in order to solve the issue of "key escrow" and also to improve the persuasiveness of attribute, so that the resultant scheme is  ...  This scheme is more adapted for sharing the data in a cloud on remote servers. The data owners have the complete control of the data access policy.  ... 
doi:10.18535/ijecs/v6i5.30 fatcat:x3mjucju5jbatg35lmytfpjen4

Domain Based Access Control Model for Distributed Collaborative Applications

Yuri Demchenko, Cees Laat, Leon Gommans, Rene Buuren
2006 2006 Second IEEE International Conference on e-Science and Grid Computing (e-Science'06)  
The paper provides implementation details on the use of XACML for fine-grained access control policy definition for domain based resources and roles organisation.  ...  The proposed extensions/solutions address the following problems: hierarchical resources policy administration, user roles/attributes management, dynamic security context and authorisation session management  ...  control systems into one integrated access control solution.  ... 
doi:10.1109/e-science.2006.261108 dblp:conf/eScience/DemchenkoLGB06 fatcat:u2pifdwzfvaqvhqdsqjl4nclze

Secure Data Sharing in Scalable Mobile Cloud Environment using HABE with Re-Encryption

B. SaranyaDevi, S. Shruthi, S. ThivyaRajeswari, P. Shanthi, A. Umamakeswari
2015 Indian Journal of Science and Technology  
With this the data are stored securely in cloud and the system is scalable for group communication. To reduce computational overhead during revocation Proxy re-encryption technique is used.  ...  The HABE imbibes the hierarchical generation of keys from HIBE systems and flexible access control from CP-ABE systems.  ...  The access rights of the users differ based on the access policy constructed. This provides fine-grained access control over the data. Any user can join the system at any time.  ... 
doi:10.17485/ijst/2015/v8is9/65590 fatcat:e74jv7n7zrbjlkht2a2xx4voym

Context-Sensitive Policy Based Security in Internet of Things

Prajit Kumar Das, Sandeep Narayanan, Nitin Kumar Sharma, Anupam Joshi, Karuna Joshi, Tim Finin
2016 2016 IEEE International Conference on Smart Computing (SMARTCOMP)  
We discuss use-cases where our design will help in creating an "intelligent" IoT device and ensuring data security and privacy using context-sensitive information sharing policies. 978-1-5090-0898-816$31.00  ...  The Internet of Things (IoT), also referred to as Cyber-Physical Systems, is a collection of physical entities with computational and communication capabilities.  ...  are grounded out in models that are well understood in the security community. 1) Attribute Based Access Control Model: The Attribute-Based Access Control (ABAC) model provides access control based on  ... 
doi:10.1109/smartcomp.2016.7501684 dblp:conf/smartcomp/DasNSJJF16 fatcat:2n7fcwrmira4fia63g7inqdz5i

Managing Access to Service Providers in Federated Identity Environments: A Case Study in a Cloud Storage Service

Thomas Diniz, Andre Castro de Felippe, Taina Medeiros, Carlos Eduardo da Silva, Roberto Araujo
2015 2015 XXXIII Brazilian Symposium on Computer Networks and Distributed Systems  
This paper proposes a solution to this problem through a hierarchical authorization system.  ...  Each Service Provider (SP) of a federation implements their own access control mechanism. Moreover, SPs might need to allow different access control granularity.  ...  The FACS (Federated Access Control System) provides a hierarchical privilege management solution, where access control policies definitions are delegated to IdP administrators, which can then define whose  ... 
doi:10.1109/sbrc.2015.32 dblp:conf/sbrc/DinizFMSA15 fatcat:ekocycjsfzc3tgy4arh34c3x6e

Analysis of Different Access Control Mechanism in Cloud

Punithasurya K, Jeba Priya S
2012 International Journal of Applied Information Systems  
We present various types of access control mechanisms that are used in cloud computing environment.  ...  Access control can be enabled in most of the computing environment such as Peer to Peer, Grid and Cloud. Cloud storage services are accessed through a cloud storage gateway.  ...  i) Delegation of attribute authority ii) Decentralization of attributes iii) Interference of attributes In attribute based access control the attributes are considered based on the user's request and the  ... 
doi:10.5120/ijais12-450660 fatcat:cxqpx4fg5jhfnnpqkrkkhwoply

A Survey on an Efficient Technique of Encryption Scheme and its Extension in Cloud Based PHR System

Prachi Dhavane, Dipak Patil
2014 International Journal of Engineering Trends and Technoloy  
To achieve the fine grained and scalable data access, the ABE technique and its extensions are introduced in this paper.  ...  Since, the privacy management is a complex task in the PHR management process; the issues such as risk of privacy exposure, scalability, data loss, flexible access have remained the most important task  ...  Zheng [12] proposed Expressive Key-Policy ABE, the encryption methods in clouds Attribute-based encryption (ABE), allows fine grained access control on encrypted data.  ... 
doi:10.14445/22315381/ijett-v10p260 fatcat:tmjtcszvznaphhhg6ocdjgl5vy

M-HABE: A New Access Control Method For Secure Cloud Computing On Mobile Devices

Barkha Nandwana
2018 International Journal of Innovative Research and Growth  
So, this research paper presents an effective safe and secure hierarchical access control method known as M-HABE (Modified Hierarchical Attribute-Based Encryption) and a modified three-layer structure.  ...  This new method mainly concentrates on the data storing, processing and accessing where it make sure that only the user with legal authorities get access to information and restricts the unauthorized users  ...  Goyal et al. (2006) Cipher text-policy Attribute-Based Encryption (CP-ABE) [11] currently the existed system is ABE (Attribute Based Encryption) access control method.  ... 
doi:10.26671/ijirg.2018.4.6.101 fatcat:wgufhpxje5gklk3ncc37gzsnau

Fine Grained Access Control Based on Smart Contract for Edge Computing

Yong Zhu, Xiao Wu, Zhihui Hu
2022 Electronics  
SCAC (Smart Contract-based Access Control) is based on ABAC (Attributes Based Access Control) and RBAC (Role Based Access Control).  ...  By designing SSH-based interface for edge computing and blockchain access, SCAC parameters can be found and set to adjust ACLs (Access Control List) and their policies.  ...  XACML-based access control policy can use the same description policy in multiple different systems.  ... 
doi:10.3390/electronics11010167 fatcat:bx4cvnqr4zgbjj7hnttkvmsgha
« Previous Showing results 1 — 15 out of 80,550 results