A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Filters
SFINKS: Secure Focused Information, News, and Knowledge Sharing
2008
2008 IEEE Conference on Technologies for Homeland Security
While traditional hierarchical information sharing approaches ensure that only relevant information is delivered to authorized nodes, the resulting organizational overhead severely impedes timely sharing ...
Nita-Rotaru and Li [8] presented a framework for role-based access control in group communication systems. ...
We also use the Adaptive Trust Negotiation and Access Control (ATNAC) framework [10] [11] based on two well established systems: TrustBuilder [15] and Generic Authorization and Access control API 2 ...
doi:10.1109/ths.2008.4534486
fatcat:kygsp5i6gfhxrkpyqtomc7v5f4
A Review of fine grained access control techniques
2018
International Journal of Engineering & Technology
In this paper, the issue of access control is discussed by defining traditional access policies. Attribute based access policy is analysed with its types. ...
Therefore, an elastic access control or fine-grained access control approach for data is urgently required and becomes a challenging open problem. ...
We surveyed different attributes based encryption (ABE) schemes used in cloud infrastructure for providing access to data on cloud. ...
doi:10.14419/ijet.v7i2.7.10249
fatcat:jaemco3hanhd5gpnojeojmbnsq
Survey on Access Control Mechanisms in Cloud Computing
2018
Journal of Cyber Security and Mobility
It is a critical task for end users to control access to resources because lack of control often leads to security risks. In addition, this may cause systems to fail. ...
This paper describes seven different access control mechanisms used in cloud computing platforms for different purposes. ...
Hierarchical Attribute Based Access Control Hierarchical Attribute Based Access Control (HABE) surfaced as a result of its usage of the features of FGAC and Ciphertext-Policy Attribute-Based Encryption ...
doi:10.13052/jcsm2245-1439.731
fatcat:m547cr5vovc6vdzdt64wodj52i
Fine-Grained Ranked Multi-Keyword Search over Hierarchical Data for IoT-oriented Health System
2019
IEEE Access
In this paper, to tackle these issues, we propose a fine-grained ranked multi-keyword search scheme over hierarchical data by leveraging ciphertext-policy hierarchical attribute-based encryption (CP-HABE ...
As a potential and promising solution, attribute-based keyword search (ABKS) can provide fine-grained keyword search and access control over the encrypted data at the same time. ...
To support hierarchical access control over encrypted hierarchical data, ciphertext-policy hierarchical attribute-based encryption (CP-HABE) schemes [8] , [9] were built.
B. ...
doi:10.1109/access.2019.2928441
fatcat:xgg27b33ovdvha3qf2sfitnvgi
A Review on Access Control Policy and Key Generation in Data Sharing
2019
International Journal of Advanced Engineering Research and Science
Also we review the different attribute based access control mechanisms used in existing systems. ...
It consist four different attribute based encryption schemes such as KP-ABE (Key-policy attribute-based encryption), CP-ABE (ciphertext-policy attribute-based encryption), HABE (Hierarchical Attribute ...
doi:10.22161/ijaers.6.2.6
fatcat:jghs5et6lbhxxjgd7e2c2d2cve
AN EXTENSIVE STUDY TOWARDS ACHIEVING FINE GRAINED ACCESS CONTROL ON ENCRYPTED CLOUD DATA
2018
International Journal of Advanced Research in Computer Science
In order to handle implication of this study, we plan to propose an Ensemble operator on the Fine grained access control through Time, Location and Profile constrainst on the access policy to the attribute ...
Fine grained access control is employed against encrypted data. In addition to more advantage, the access control mechanism also faces several issues in terms of automatic revocation. ...
against the access violation is been modelled using various models is described below
Hierarchical Attribute Based Access Control Mechanism In this literature, a hierarchical attribute-based access ...
doi:10.26483/ijarcs.v9i3.6118
fatcat:5cg7ewgzbjemtdaojlsr7mm75e
Secure Data Sharing In Cloud Computing By Implementing Amednded Attribute Based Data Sharing Scheme
2017
International Journal Of Engineering And Computer Science
Cipher text-Policy Attribute based Encryption (CP-ABE) is regarded as one of the most suitable technologies in cloud storage for data access control, since it gives data owners more undeviating control ...
In the proposed system, attribute-based data sharing scheme is revisited in order to solve the issue of "key escrow" and also to improve the persuasiveness of attribute, so that the resultant scheme is ...
This scheme is more adapted for sharing the data in a cloud on remote servers. The data owners have the complete control of the data access policy. ...
doi:10.18535/ijecs/v6i5.30
fatcat:x3mjucju5jbatg35lmytfpjen4
Domain Based Access Control Model for Distributed Collaborative Applications
2006
2006 Second IEEE International Conference on e-Science and Grid Computing (e-Science'06)
The paper provides implementation details on the use of XACML for fine-grained access control policy definition for domain based resources and roles organisation. ...
The proposed extensions/solutions address the following problems: hierarchical resources policy administration, user roles/attributes management, dynamic security context and authorisation session management ...
control systems into one integrated access control solution. ...
doi:10.1109/e-science.2006.261108
dblp:conf/eScience/DemchenkoLGB06
fatcat:u2pifdwzfvaqvhqdsqjl4nclze
Secure Data Sharing in Scalable Mobile Cloud Environment using HABE with Re-Encryption
2015
Indian Journal of Science and Technology
With this the data are stored securely in cloud and the system is scalable for group communication. To reduce computational overhead during revocation Proxy re-encryption technique is used. ...
The HABE imbibes the hierarchical generation of keys from HIBE systems and flexible access control from CP-ABE systems. ...
The access rights of the users differ based on the access policy constructed. This provides fine-grained access control over the data. Any user can join the system at any time. ...
doi:10.17485/ijst/2015/v8is9/65590
fatcat:e74jv7n7zrbjlkht2a2xx4voym
Context-Sensitive Policy Based Security in Internet of Things
2016
2016 IEEE International Conference on Smart Computing (SMARTCOMP)
We discuss use-cases where our design will help in creating an "intelligent" IoT device and ensuring data security and privacy using context-sensitive information sharing policies. 978-1-5090-0898-816$31.00 ...
The Internet of Things (IoT), also referred to as Cyber-Physical Systems, is a collection of physical entities with computational and communication capabilities. ...
are grounded out in models that are well understood in the security community. 1) Attribute Based Access Control Model: The Attribute-Based Access Control (ABAC) model provides access control based on ...
doi:10.1109/smartcomp.2016.7501684
dblp:conf/smartcomp/DasNSJJF16
fatcat:2n7fcwrmira4fia63g7inqdz5i
Managing Access to Service Providers in Federated Identity Environments: A Case Study in a Cloud Storage Service
2015
2015 XXXIII Brazilian Symposium on Computer Networks and Distributed Systems
This paper proposes a solution to this problem through a hierarchical authorization system. ...
Each Service Provider (SP) of a federation implements their own access control mechanism. Moreover, SPs might need to allow different access control granularity. ...
The FACS (Federated Access Control System) provides a hierarchical privilege management solution, where access control policies definitions are delegated to IdP administrators, which can then define whose ...
doi:10.1109/sbrc.2015.32
dblp:conf/sbrc/DinizFMSA15
fatcat:ekocycjsfzc3tgy4arh34c3x6e
Analysis of Different Access Control Mechanism in Cloud
2012
International Journal of Applied Information Systems
We present various types of access control mechanisms that are used in cloud computing environment. ...
Access control can be enabled in most of the computing environment such as Peer to Peer, Grid and Cloud. Cloud storage services are accessed through a cloud storage gateway. ...
i) Delegation of attribute authority ii) Decentralization of attributes iii) Interference of attributes In attribute based access control the attributes are considered based on the user's request and the ...
doi:10.5120/ijais12-450660
fatcat:cxqpx4fg5jhfnnpqkrkkhwoply
A Survey on an Efficient Technique of Encryption Scheme and its Extension in Cloud Based PHR System
English
2014
International Journal of Engineering Trends and Technoloy
English
To achieve the fine grained and scalable data access, the ABE technique and its extensions are introduced in this paper. ...
Since, the privacy management is a complex task in the PHR management process; the issues such as risk of privacy exposure, scalability, data loss, flexible access have remained the most important task ...
Zheng [12] proposed Expressive Key-Policy ABE, the encryption methods in clouds Attribute-based encryption (ABE), allows fine grained access control on encrypted data. ...
doi:10.14445/22315381/ijett-v10p260
fatcat:tmjtcszvznaphhhg6ocdjgl5vy
M-HABE: A New Access Control Method For Secure Cloud Computing On Mobile Devices
2018
International Journal of Innovative Research and Growth
So, this research paper presents an effective safe and secure hierarchical access control method known as M-HABE (Modified Hierarchical Attribute-Based Encryption) and a modified three-layer structure. ...
This new method mainly concentrates on the data storing, processing and accessing where it make sure that only the user with legal authorities get access to information and restricts the unauthorized users ...
Goyal et al. (2006) Cipher text-policy Attribute-Based Encryption (CP-ABE) [11] currently the existed system is ABE (Attribute Based Encryption) access control method. ...
doi:10.26671/ijirg.2018.4.6.101
fatcat:wgufhpxje5gklk3ncc37gzsnau
Fine Grained Access Control Based on Smart Contract for Edge Computing
2022
Electronics
SCAC (Smart Contract-based Access Control) is based on ABAC (Attributes Based Access Control) and RBAC (Role Based Access Control). ...
By designing SSH-based interface for edge computing and blockchain access, SCAC parameters can be found and set to adjust ACLs (Access Control List) and their policies. ...
XACML-based access control policy can use the same description policy in multiple different systems. ...
doi:10.3390/electronics11010167
fatcat:bx4cvnqr4zgbjj7hnttkvmsgha
« Previous
Showing results 1 — 15 out of 80,550 results