Filters








297,015 Hits in 7.4 sec

Real-time update of access control policies

Indrakshi Ray
2004 Data & Knowledge Engineering  
In this paper we address the problem of real-time update of access control policies in the context of a database system.  ...  The need for real-time update of such policies while they are in effect and enforcing the changes immediately, arise in many scenarios.  ...  An example will help motivate the need for real-time update of policies.  ... 
doi:10.1016/j.datak.2003.09.003 fatcat:o2hkv3iccze4lgejubduqf4wwm

Concurrent and Real-Time Update of Access Control Policies [chapter]

Indrakshi Ray, Tai Xin
2003 Lecture Notes in Computer Science  
In this paper, we consider real-time update of access control policies in a database system.  ...  Real-time update of access control policies, that is, updating policies while they are in effect and enforcing the changes immediately, is necessary for many security-critical applications.  ...  In this paper we focus on real-time update of access control policies in a database system. We propose two algorithms for real-time update of access control policies.  ... 
doi:10.1007/978-3-540-45227-0_33 fatcat:p6pmb6lhbjf5rh4xhg76udsr6e

Applying semantic knowledge to real-time update of access control policies

I. Ray
2005 IEEE Transactions on Knowledge and Data Engineering  
In this paper, we consider real-time update of access control policies in a database system.  ...  Real-time update of access control policies, that is, updating policies while they are in effect and enforcing the changes immediately, is necessary for many security-critical applications.  ...  The idea that semantic knowledge can be used for real-time update of access control policies was proposed by Ray [38] .  ... 
doi:10.1109/tkde.2005.88 fatcat:e33ztt43snd3xpb3rihxwwezda

Implementing Real-Time Update of Access Control Policies [chapter]

Indrakshi Ray, Tai Xin
IFIP International Federation for Information Processing  
Real-time update of access control policies, that is, updating policies while they are in effect and enforcing the changes immediately, is necessary for many security-critical applications.  ...  In this paper, we consider real-time update of access control policies that arise in a database system. Updating policy while they are in-effect can lead to potential security problems.  ...  In a separate work Ray [13] shows how the semantics of transactions can provide more concurrency for real-time update of access control policies.  ... 
doi:10.1007/1-4020-8128-6_5 dblp:conf/dbsec/RayX04 fatcat:ig6x2op6cfa3xg4345bpgj5n44

Adaptive Update Policy for Proactive Management of Deadline Miss Ratio and Data Freshness in Real-Time Database Models

Sanjay Tanwani, Ashwani Kumar Ramani
2005 Journal of Computer Science  
Important applications, like e-commerce, online stock trading, traffic control demand real-time data services. Conventional database perform poor at these applications.  ...  A database for real-time data services has to support timing constraints and temporal consistency in addition to supporting characteristics of a conventional database system.  ...  INTRODUCTION A real time database is used in important applications, like e-commerce, online stock trading and traffic control requiring stringent timing constraints for completion of tasks.  ... 
doi:10.3844/jcssp.2005.495.499 fatcat:6wzmcbpij5ee5gqyqgbjysdb6a

T-RBAC based Multi-domain Access Control Method in Cloud

Dapeng Xiong, Liang Chen
2017 Network Protocols and Algorithms  
New method combined the advantage of RBAC and task driving model, joined with limit aging and real time strategy synthesis.  ...  In order to improve the deficiency of the current multi domain access control in timeliness and flexibility. This paper put forward a dynamic access control policy on the basis of task driving idea.  ...  Acknowledgement This research has been supported by National High Technology Research and Development Application of China (2012AA012902) and "HGJ" National Major Technological Projects (2013ZX01045-004  ... 
doi:10.5296/npa.v8i4.10411 fatcat:gbmzmnehafd4nhcfgj6s4imike

A lattice-based approach for updating access control policies in real-time

Tai Xin, Indrakshi Ray
2007 Information Systems  
In this paper, we propose a solution to this problem -we consider real-time update of access control policies in the context of a database system.  ...  Real-time update of access control policies, that is, updating policies while they are in effect and enforcing the changes immediately and automatically, is necessary for many dynamic environments.  ...  The use of semantic knowledge for real-time update of access control policies was proposed by Ray [31] .  ... 
doi:10.1016/j.is.2006.06.002 fatcat:tsccufyqirahxa25bfua4ou35m

Intelligent Performance-Aware Adaptation of Control Policies for Optimizing Banking Teller Process using Machine Learning

Bilal Tay, Azzam Mourad
2020 IEEE Access  
INDEX TERMS Optimization of tellers business process, banking business process, behavior-aware access control, performance-aware access control, machine learning, SVM, dynamic policy adaptation.  ...  We demonstrate that our model is capable of assessing the deployed control policies and updating them systematically with new roles and authorization levels based on tellers' performance, work history,  ...  The performance-aware control policy dynamically updates the control policies to grant tellers access to functionalities they want based on their predicted work behavior.  ... 
doi:10.1109/access.2020.3015616 fatcat:ftyu6qkw5ncwbgfu6jtdfuhp6u

SparkXS: Efficient Access Control for Intelligent and Large-Scale Streaming Data Applications

Davy Preuveneers, Wouter Joosen
2015 2015 International Conference on Intelligent Environments  
This paper presents SparkXS, an attribute-based access control solution with the ability to define access control policies on streaming latent data, i.e. hidden information made explicit through data analytics  ...  The huge diversity and the streaming nature of data raises the demand for new enabling technologies for scalable access control that can deal with the growing velocity, volume and variety of volatile data  ...  For 14000 location updates per second, we found the processing could no longer be executed in real-time.  ... 
doi:10.1109/ie.2015.21 dblp:conf/intenv/PreuveneersJ15 fatcat:vudddiu6offjlg6zxfyj56omhy

A Grammar for Specifying Usage Control Policies

R. Teigao, C. Maziero, A. Santin
2007 2007 IEEE International Conference on Communications  
Usage control goes beyond traditional access control, addressing its limitations related to attribute mutability and continuous usage permission validation.  ...  The recently proposed UCONABC model establishes an underlying mathematical framework to deal with the new needs of security and control systems.  ...  We believe that having a grammar, such as the one presented here, and an efficient enforcer, can ease the adoption of UCON ABC as a powerful access control, DRM, and data protection solution.  ... 
doi:10.1109/icc.2007.232 dblp:conf/icc/TeigaoMS07 fatcat:hd2k4blyy5dwtmwg4sm3u4pxde

Cost-effective enforcement of UCONA policies

Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Artsiom Yautsiukhin
2011 2011 6th International Conference on Risks and Security of Internet and Systems (CRiSIS)  
In Usage CONtrol (UCON) access decisions rely on mutable attributes. A reference monitor should re-evaluate security policies each time when attributes change their values.  ...  We assign monetary outcomes for granting and revoking access to legitimate and malicious users and compare the proposed policy enforcement models in terms of cost-efficiency.  ...  Correct Enforcement of Access Control Access control starts at time t try = cl AP (0) upon receiving the access request and the initial attribute value.  ... 
doi:10.1109/crisis.2011.6061833 dblp:conf/crisis/KrautsevichLMY11 fatcat:ojfkglpsqbbtdceb7ufljyvcci

FRAC: Implementing Role-Based Access Control for Network File Systems

Aniruddha Bohra, Stephen Smaldone, Liviu Iftode
2007 Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)  
It also allows administrators to define dynamic policies based on access history and the environment, e.g., time of day.  ...  FRAC introduces a virtual control namespace (VCN) that provides an interface to query and update the state of the access control framework over the standard file system protocol.  ...  Third, delegation of roles is illustrated through a dynamic time-based policy, and fourth, per-file access control policies, defined by the user, are enforced.  ... 
doi:10.1109/nca.2007.25 dblp:conf/nca/BohraSI07 fatcat:bitxe6tsh5erbmfupkp5vcict4

XACs-DyPol: Towards an XACML-based Access Control Model for Dynamic Security Policy [article]

Tran Khanh Dang, Xuan Son Ha, Luong Khiem Tran
2020 arXiv   pre-print
However, of late, the growing popularity of big data has created a new challenge which the security policy management is facing with such as dynamic and update policies in run time.  ...  The datasets are XACML 3.0-based policies, including three samples of real-world policy sets.  ...  On the other hand, the dynamic security policy is the update policy in the real-time even when the access request has been granted by these policies [4] .  ... 
arXiv:2005.07160v1 fatcat:dxpe77xqxbbnlonjec2s3ppu6a

Chronos: Feedback Control of a Real Database System Performance

Kyoung-Don Kang, Jisu Oh, Sang H. Son
2007 28th IEEE International Real-Time Systems Symposium (RTSS 2007)  
We also propose a new self-adaptive update policy to adapt the freshness of cold data in a differentiated manner based on temporal data access and update patterns.  ...  Unlike most existing work on feedback control of real-time database (RTDB) performance, we actually implement and evaluate feedback control and database workload adaptation techniques in a real database  ...  If δq(k) < 0, apply the adaptive update policy to a subset of cold data whose update frequencies are higher than their access frequencies.  ... 
doi:10.1109/rtss.2007.16 dblp:conf/rtss/KangOS07 fatcat:obgwuvq3qffvhgmalh2wk2uerm

A Real-Time Model-Based Reinforcement Learning Architecture for Robot Control [article]

Todd Hester, Michael Quinlan, Peter Stone
2011 arXiv   pre-print
on tasks that require real-time actions such as controlling an autonomous vehicle.  ...  For an RL algorithm to be practical for robotic control tasks, it must learn in very few actions, while continually taking those actions in real-time.  ...  ACKNOWLEDGMENTS This work has taken place in the Learning Agents Research Group (LARG) at the Artificial Intelligence Laboratory, The University of Texas at Austin.  ... 
arXiv:1105.1749v2 fatcat:7j7dnqntt5ac5p7oej5vk5obxa
« Previous Showing results 1 — 15 out of 297,015 results