Filters








922,600 Hits in 5.2 sec

Security Policies in Distributed CSCW and Workflow Systems

Tanvir Ahmed, Anand R. Tripathi
2010 IEEE transactions on systems, man and cybernetics. Part A. Systems and humans  
Research challenges of role based access control models for security policies in distributed CSCW and workflow systems are presented.  ...  In this paper, we have surveyed Computer-Supported Cooperative Work (CSCW) and workflow systems based on a time-line and have categorized the systems based on their emphasis on user or process interactions  ...  In network management [61] , role based management in proposed with support for obligation policy.  ... 
doi:10.1109/tsmca.2010.2046727 fatcat:ysjm5nn5hjeehpfa7k3xbmja64

Data Security Monitoring Platform in Cloud for Enterprise

Geng Yushui, Pang Shunpeng
2013 International Journal of Security and Its Applications  
So the system needs higher data security mechanism. This paper wants to build a data security monitoring model in cloud platform for large enterprises.  ...  The model proposed by this paper uses multi-tenancy SaaS(Software as Service) application architecture, RBAC (Role-Based policies Access Control) model and operation in the context of environmental perception  ...  system, Context-based policy management system, Data-filtering system and Data-auditing system.  ... 
doi:10.14257/ijsia.2013.7.6.07 fatcat:ls47dplocbcd7feetif7opapte

Securely and flexibly sharing a biomedical data management system

Fusheng Wang, Phillip Hussels, Peiya Liu, Khan M. Siddiqui, Brent J. Liu
2009 Medical Imaging 2009: Advanced PACS-based Imaging Informatics and Therapeutic Applications  
Furthermore, to simplify the management of users and privileges, customizable role-based user model is developed.  ...  Biomedical database systems need not only to address the issues of managing complex data, but also to provide data security and access control to the system.  ...  Acknowledgments The project is funded in part by the National Institutes of Health, under Grant No. U54 CA105480-05.  ... 
doi:10.1117/12.811716 pmid:21625285 pmcid:PMC3103222 fatcat:a34pl6qcuzaotdwjko5xmkddxe

Database Security Model using Access Control Mechanism in Student Data Management

Aye Mon Win, Khin Lay Myint
2019 International Journal of Trend in Scientific Research and Development  
This paper focused on a student data management system by using Data Access Control model. According to the concept, only the administrator has the privilege to manage or administer the data.  ...  This paper present a procedure to implement a Data Access Policy to ensure the protection of privacy rights of students' records within student data management system.  ...  Users and Roles as used in access control In the student data management system, users are granted membership into roles based on their qualifications and responsibilities in the organization.  ... 
doi:10.31142/ijtsrd22820 fatcat:s5db2owm35cirkbtjticbdfjdy

Enforcing Role-Based Access Control for Secure Data Storage in the Cloud

L. Zhou, V. Varadharajan, M. Hitchens
2011 Computer journal  
In the existing system, role manager give authorization to user when he begins encryption. After that user have all the permission to access the function.  ...  The project developed by access provides security by enabling the function of role manager. The role manager monitors every function to provide additional security.  ...  A secure RBAC based hybrid cloud storage architecture which allows an organization to store data securely in a public cloud.  ... 
doi:10.1093/comjnl/bxr080 fatcat:e6qbqgatqnhtlnieygr3td6ffi

Security in Multi-domain Event-based SystemsSicherheit in ereignis-basierten Mehrdomänensystemen

Jean Bacon, David Eyers, Jatinder Singh, Brian Shand, Matteo Migliavacca, Peter Pietzuch
2009 it - Information Technology  
We provide an overview of the state-of-the-art in secure event-based systems: research already carried out, work in progress and issues still to be addressed.  ...  We discuss security issues for multi-domain, event-based systems, considering the requirements of applications and the risk associated with failure.  ...  security analysis in complex event-based systems.  ... 
doi:10.1524/itit.2009.0552 fatcat:u3qk7lm4enfnvhkoc2wql3sbge

Enterprise Information Security Management Based on Context-Aware RBAC and Communication Monitoring Technology

Mei-Yu Wu, Ming-Hsien Yu
2013 Mathematical Problems in Engineering  
This research proposes an information security management approach that is based on context-aware role-based access control (RBAC) and communication monitoring technology, in order to achieve enterprise  ...  information security management.  ...  An information security management system (ISMS) is one part of the overall management system and is based on a business risk approach, in order to establish, implement, operate, monitor, review, maintain  ... 
doi:10.1155/2013/569562 fatcat:aycylpvlhbfkdaf6jany247wze

Security strategies for cloud identity management - a study

Anilkumar Chunduru, Sumathy S
2018 International Journal of Engineering & Technology  
Data security and access control are the drawbacks in existing access control schemes.  ...  Emphasis on security for providing Access Control in Cloud computing environment plays a significant role.  ...  DivyaPritam et.al (2016) Authentication and Encryption Techniques for Secure Data Storage in Cloud for Enforcing Role-Based Access Control • RBAC policy to manage the custom of Data Owners information  ... 
doi:10.14419/ijet.v7i2.10410 fatcat:ml54ydwz3rh37lqwcmjpvtkpae

A Design of Onto-ACM(Ontology based Access Control Model) in Cloud Computing Environments

Chang Choi, Junho Choi, Byeongkyu Ko, Kunseok Oh, Pankoo Kim
2012 Journal of Internet Services and Information Security  
RBAC(Role-Based Access Control) and C-RBAC(Context-Aware Role Based Access Control) do not suggest effective and practical solution using dynamic access control method by manager and user.  ...  Especially, data access using various resources needs authentication and access control model for integrated management and control in cloud computing environments.  ...  information based on context-role in ubiquitous computing system.  ... 
doi:10.22667/jisis.2012.11.31.054 dblp:journals/jisis/ChoiCKOK12 fatcat:sydjt2ta5feubbqcmvxhyfg6ki

Enhancing Risk-Based Decisions by Leveraging Cyber Security Automation

Tina AlSadhan, Joon S. Park
2016 2016 European Intelligence and Security Informatics Conference (EISIC)  
Our ongoing research seeks to further refine our ISCM framework with specific emphasis to enhance risk-based decision making by leveraging security automation.  ...  to support cyber security.  ...  Participants will identify themselves by their respective role in the organization 1) IT Manager with security roles, 2) IT Specialist with security roles, 3) Security Manager, or 4) IT Security Specialist  ... 
doi:10.1109/eisic.2016.042 dblp:conf/eisic/AlsadhanP16 fatcat:a7zfathiqfddhnpqewdzsqvity

Role-Attribute-Based Encryption (RABE) Access Control for Healthcare Cloud Systems

Paolina Centonze
2016 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
in order to improve data privacy on cloud systems used in healthcare.  ...  This journal compares and investigates two different access control models, in particular Role-Based Access Control and Attribute-Based Access Control, to validate the confidentiality of data when storing  ...  In addition, I would like to thank all of the faculty as well as students of the Computer Science Department at Iona College for sharing their knowledge and experiecnes with me in support of my scholarly  ... 
doi:10.24297/ijct.v15i8.1501 fatcat:zdbrly7qojeofpbwpeny6ddtly

Efficient Role Based Encryption in Hybrid Clouds

P. Rajeshwari
2016 International Journal Of Scientific Research And Education  
In this work I propose to bring out the issues, methodologies and frame work to address data security and management in hybrid clouds while the data federation happens, offering the role based access mechanisms  ...  The data in private cloud is often secure and could be accessed using role based access mechanisms.  ...  Secure Communications: ID-based signature (IBS) scheme is used in this system to certify the data communicated between the different parties.  ... 
doi:10.18535/ijsre/v4i01.14 fatcat:qq66p2vfnngcjgowayw3j46gle

Applying RBAC Security Control Model to Manufacturing and Logistics Service Platform

Moon Sun SHIN, Yong Wan JU, Hyun Kyu KANG, Seon Phil JEONG
2015 Studies in Informatics and Control  
In this paper, we have analyzed and figured out requirements of the security for the efficient international RFID-based logistics service.  ...  The security policy includes definition of subjects, objects, permissions, roles, role hierarchy and constraints of the enterprise.  ...  Similar to the security management in the previous role of manager, functions of the security management, including creation of permission, roles, users, and role management, are subdivided.  ... 
doi:10.24846/v24i2y201511 fatcat:pedumgjf35fqldq44tmis2sfvy

Role Based Encryption with Efficient Access Control in Cloud Storage

2016 International Journal of Science and Research (IJSR)  
In this paper, a practical RBAC (Role Based Access Control) model is proposed to hold various security features like encryption, role management, role hierarchy, etc.  ...  Cloud computing is a pool of large systems interconnected with each other for scalable data and file storage.  ...  RBE scheme with new feature may helps in reducing this drawback.Admin and Role Manager perform different tasks in this system.  ... 
doi:10.21275/v5i2.nov161454 fatcat:niuvrs6yabcnvoe4nxyna2qb4m

A Framework for Agent-Based Trust Management in Online Auctions

Haiping Xu, Sol M. Shatz, Christopher K. Bates
2008 Fifth International Conference on Information Technology: New Generations (itng 2008)  
In this paper, we present a general framework for agentbased trust management (ATM) in online auctions.  ...  A trustworthy online auction system requires a dynamic trust management module that can detect abnormal bidding activities in real-time, notify the involved users, and cancel the corresponding auction  ...  The approach presented in this paper is based on our previous work for real-time trust management in agent-based online auction systems [12] ; however, our previous trust management model only consists  ... 
doi:10.1109/itng.2008.22 dblp:conf/itng/XuSB08 fatcat:wf3ufhzuonbvlnhrxemm2oenjy
« Previous Showing results 1 — 15 out of 922,600 results