Filters








289,972 Hits in 7.7 sec

Geospatial Resource Description Framework (GRDF) and security constructs

Ashraful Alam, Latifur Khan, Bhavani Thuraisingham
2008 2008 IEEE 24th International Conference on Data Engineering Workshop  
In this paper, we propose a set of geospatial constructs written in Web Ontology Language (OWL) and collectively referred to as Geographic Resource Description Framework (GRDF).Our goal is to propose a  ...  We also publish our work on security constructs for GRDF that allows domain experts and software developers to address the security concerns as part of the core development process instead of an ad-hoc  ...  This scenario illustrates the need for a comprehensive geospatial security mechanism with fine-grain access control over resources.  ... 
doi:10.1109/icdew.2008.4498363 dblp:conf/icde/AlamKT08 fatcat:fwjhnhv3zjeudlkzkmdotjzqoy

Geospatial Resource Description Framework (GRDF) and security constructs

Ashraful Alam, Laitfur Khan, Bhavani Thuraisingham
2011 Computer Standards & Interfaces  
In this paper, we propose a set of geospatial constructs written in Web Ontology Language (OWL) and collectively referred to as Geographic Resource Description Framework (GRDF).Our goal is to propose a  ...  We also publish our work on security constructs for GRDF that allows domain experts and software developers to address the security concerns as part of the core development process instead of an ad-hoc  ...  This scenario illustrates the need for a comprehensive geospatial security mechanism with fine-grain access control over resources.  ... 
doi:10.1016/j.csi.2010.01.002 fatcat:66j6cgp425eidissqpmai5ey5y

Stalking the Resources for Security in Linked Data Applications Using Resource Description Framework

Maturi Sreerama Murty, Nallamothu Nagamalleswara Rao
2020 Ingénierie des Systèmes d'Information  
Following the accessibility of Resource Description Framework (RDF) resources is a key capacity in the establishment of Linked Data frameworks.  ...  Regardless, a large portion of them don't monitor the subtleties and execution of each sponsored resource.  ...  The security of acceptance, data security, data integrity, access control, authenticity and privileges are concerned.  ... 
doi:10.18280/isi.250609 fatcat:b3jpmiszjvgwbdprrktuftcphq

An actor-based, application-aware access control evaluation framework

William C. Garrison, Adam J. Lee, Timothy L. Hinrichs
2014 Proceedings of the 19th ACM symposium on Access control models and technologies - SACMAT '14  
By contrast, we formalize the access control suitability analysis problem, which seeks to evaluate the degree to which a set of candidate access control schemes can meet the needs of an application-specific  ...  Although expressive power is important, it is a property that exists in an absolute sense, detached from the application context within which an access control scheme will ultimately be deployed.  ...  Definition 1 (Access Control Model) An access control model M has fields S, R, Q, , where: • S is a set of states • R is a set of access control requests • Q is a set of queries including auth(r) for every  ... 
doi:10.1145/2613087.2613099 dblp:conf/sacmat/GarrisonLH14 fatcat:yo2rn2bkmjhutlkqf4ridiwqnm

An Intelligent Access Control Model [chapter]

Shadha Mohamed Sulaiyam ALAmri
2021 Quality Control in Intelligent Manufacturing [Working Title]  
The research approach aims to enhance the basic ABAC (Attribute-Based Access Control) model by adding a context-aware feature and SoD principle. The enhanced model called ABACsh.  ...  This chapter is exploring the need for a dynamic access control approach to enhance the Cybersecurity.  ...  The request indicates an access control request from a user (subject) to access nova-resources (object).  ... 
doi:10.5772/intechopen.95459 fatcat:kxm42pk47balzdmtxqueqapg3a

An access control model for mobile physical objects

Florian Kerschbaum
2010 Proceeding of the 15th ACM symposium on Access control models and technologies - SACMAT '10  
In this paper we propose a new access control model as an extension to attribute-based access control that allows trajectory-based visibility policies.  ...  Existing access control models cannot encode this information efficiently.  ...  The ABAC framework integrates the features and expressive power of many access control models, including the classics RBAC, discretionary access control (DAC) and mandatory access control (MAC).  ... 
doi:10.1145/1809842.1809873 dblp:conf/sacmat/Kerschbaum10 fatcat:cxueeo5tw5debbw3dpytgryfye

Development of a System Framework for Implementation of an Enhanced Role-Based Access Control Model to Support Collaborative Processes

Nakeisha Schimke, John Hale
2012 USENIX Security Symposium  
We previously developed an enhanced Role-Based Access Control (RBAC) model to support information access management in the context of team collaboration and workflow.  ...  We report in this paper a generic system framework to implement the enhanced RBAC with three functional layers: (1) encoding of access control policies; (2) interpretation of the encoded policies; and  ...  Amneris Luque, Terry Doll, Monica Barbosu, and Thomas Della Porta) for their contributions to develop the CEI Admin system and to evaluate the enhanced RBAC model.  ... 
dblp:conf/uss/SchimkeH12 fatcat:dqtl7j7g35bafpwpqmowux4qv4

An Adaptive Access Control Model for Web Services

Elisa Bertino, Anna C. Squicciarini, Lorenzo Martino, Federica Paci
2006 International Journal of Web Services Research  
This paper presents an innovative access control model, referred to as Web service Access Control Version 1 (Ws-AC1), specifically tailored to Web services.  ...  We also present an encoding of our model in the Web Services Description Language (WSDL) standard for which we develop an extension, required to support Ws-AC1.  ...  ACKNOWLEDGMENTS The developments presented in this paper were partly funded by the European Commission through the IST program under Framework 6 grant 001945 to the Trustcom Integrated Project, by the  ... 
doi:10.4018/jwsr.2006070102 fatcat:o2ij2uhhu5hhleh5clhqg4inyy

XACs-DyPol: Towards an XACML-based Access Control Model for Dynamic Security Policy [article]

Tran Khanh Dang, Xuan Son Ha, Luong Khiem Tran
2020 arXiv   pre-print
Authorization and access control play an essential role in protecting sensitive information from malicious users.  ...  The system is based on security policies to determine if an access request is allowed.  ...  System Model of Dynamic Security Policy Access Control This section firstly presents an overview of our model.  ... 
arXiv:2005.07160v1 fatcat:dxpe77xqxbbnlonjec2s3ppu6a

An Access Control Language for a General Provenance Model [chapter]

Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi Sandhu, Weili Han
2009 Lecture Notes in Computer Science  
In this paper, we propose an access control language tailored to these requirements.  ...  Provenance access control has been recognized as one of the most important components in an enterprise-level provenance system.  ...  [3, 9] discussed security requirements for Service Oriented Architectures and proposed some abstract frameworks providing security mechanisms, including access control, for provenance stores.  ... 
doi:10.1007/978-3-642-04219-5_5 fatcat:fuegcnbcyjd6pgyd5pjrhij4b4

An interaction-based access control model (IBAC) for collaborative services

Mine Altunay, Gregory T. Byrd, Doug E. Brown, Ralph A. Dean
2008 2008 International Symposium on Collaborative Technologies and Systems  
We provide an access control model for a service participating in a collaboration.  ...  We couple our access control model with a policy model, so that the access requirements from collaborations can be expressed and evaluated.  ...  AN INTERACTION-BASED ACCESS CONTROL MODEL (IBAC) A subject, or a requestor, is an entity that requests access. An object is a resource that is being requested.  ... 
doi:10.1109/cts.2008.4543977 dblp:conf/cts/AltunayBBD08 fatcat:n45vyyxpcvanbl55wvapsmmfqq

OJADEAC: An Ontology Based Access Control Model for JADE Platform

Ban Sharief, Najla Aldabagh
2014 International Journal of Advanced Computer Science and Applications  
In this paper, an ontology-based access control model called (OJADEAC) is proposed to be applied in JADE platform by combining Semantic Web technologies with context-aware policy mechanism to overcome  ...  The access control model is represented by a semantic ontology, and a set of two level semantic rules representing platform and application specific policy rules.  ...  The new Semantic Web technologies shows great promising in building semantic based security services especially in building an access control model.  ... 
doi:10.14569/ijacsa.2014.050506 fatcat:jdegwf6qf5hd5lbly23boc4iiu

An Access Control Model for Preventing Virtual Machine Escape Attack

Jiang Wu, Zhou Lei, Shengbo Chen, Wenfeng Shen
2017 Future Internet  
In addition, we propose an access control model that can prevent virtual machine escape (PVME) by adapting the BLP (Bell-La Padula) model (an access control model developed by D. Bell and J.  ...  However, cloud computing introduces a set of new security problems.  ...  Access Control Model for Preventing VM Escape Attack Access Control Access control is a mechanism that explicitly allows or restricts access to a resource and the scope of accessibility.  ... 
doi:10.3390/fi9020020 fatcat:rzjdmiuvrrfs7dhtkkt2wgb74q

An Administrative Model for Role-Based Access Control Using Hierarchical Namespace

Luning Xia
2007 Journal of Computer Research and Development  
Access Control is an important mechanism of information security. Role-Based Access Control is a famous access control approach with good flexibility. RBAC96 and ARBAC97 are classical RBAC models.  ...  The ARBAC97 model facilitates decentralized administration of RBAC. However, ARBAC97 has some shortcomings in the case of being used in an organization with autonomous subsidiaries.  ...  Discretionary Access Control (DAC) and Mandatory Access Control (MAC) had been used for more than twenty years before the appearance of Role-Based Access Control (RBAC).  ... 
doi:10.1360/crad20071205 fatcat:etsxwo6p5zc6lb6u5rroemiery

OSNAC: An Ontology-based Access Control Model for Social Networking Systems

Amirreza Masoumzadeh, James Joshi
2010 2010 IEEE Second International Conference on Social Computing  
In this paper, we propose an access control model based on Semantic Web technologies that takes into account the above mentioned complex relations.  ...  We demonstrate the applicability of our approach by implementing a proof-of-concept prototype of the proposed access control framework.  ...  Although they outline an access control framework, lack of formal descriptions and implementation leaves behind many ambiguities.  ... 
doi:10.1109/socialcom.2010.116 dblp:conf/socialcom/MasoumzadehJ10 fatcat:lms3fzx7avhqvjtvbl6pplddaq
« Previous Showing results 1 — 15 out of 289,972 results