1,813 Hits in 5.9 sec

A Framework includes Path based Method and Sandbox Techniques for Effective Communication System

S. Sandhiya, S. Prakasam
2013 International Journal of Computer Applications  
Conventionally access control models are depend on the paradigm of restricting the functions of users that makes protecting users from each other or protecting system resources from users.  ...  Nowadays, many security methods are depends on a effective method in which each issues of attack is countered by a custom-made approach to eliminate the incident.  ...  Role based access control Role-based access control (RBAC) is an access control model (or class of models) that depends on users with status through semantic constructs called roles.  ... 
doi:10.5120/12923-9928 fatcat:o25qpmbgirb4loqrx4frpmkkae

ACaaS: Access Control as a Service for IaaS Cloud

Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn, Hadi Sharifi, Haiyong Xie
2013 2013 International Conference on Social Computing  
access control policies in clouds [Hu'09] -CloudPolice, a distributed access control mechanism implemented in hypervisors, to meet the access control needs of multi-tenancy, network-independence, and  ...  in public IaaS cloud computing environments  To accommodate this need, we proposed a new modular architecture towards access control as a service (ACaaS) for supporting multiple access control models  ... 
doi:10.1109/socialcom.2013.66 dblp:conf/socialcom/WuZASX13 fatcat:bqefdkmhvjfzjcrtj75vc753y4


2006 International journal of software engineering and knowledge engineering  
In this paper we describe an approach for modelling security issues in information systems. It is based on an agent-oriented approach, and extends it with the use of security patterns.  ...  Agent-oriented software engineering provides advantages when modeling security issues, since agents are often a natural way of conceptualizing an information system, in particular at the requirements stage  ...  In addition, we will work towards the integration of the pattern language with other development phases of the Tropos methodology.  ... 
doi:10.1142/s0218194006002823 fatcat:ttsuylefjvcqpdkibrbxnwar7y

COVID-X D2.1 – Sandbox Design & Datalake Creation and Ingestion [article]

2021 Zenodo  
D2.1 – Sandbox Design & Datalake Creation and Ingestion  ...  Service-Oriented Architecture The COVID-X Sandbox introduces a combination of different functions and services that collectively aim to enable seamless access to a set of healthcare data sources.  ...  This process leads to the initial design of the COVID-X Sandbox, which will be published in two major releases, following a Service-Oriented Architecture approach.  ... 
doi:10.5281/zenodo.4775426 fatcat:5wfdrddjbfh4dfdwicjij73kwi

An Investigation into Access Control in Various Types of Operating Systems

Mohamed A.Ismail, H. Aboelseoud M, Mohamed B. Senousy
2014 International Journal of Computer Applications  
Finally, the paper outlines the main problems and challenges of access control, and proposes future directions in the access control field of research.  ...  The objective of this investigation is to give a detailed overview of access control mechanisms implemented in various types of OSs like general purpose OSs, mobile OSs and distributed OSs.  ...  Application-oriented access control can be achieved by application restrictions and sandboxes techniques which are used to restrict an application's ability to access resources by devoting a set of resources  ... 
doi:10.5120/17218-7454 fatcat:qsrc7imnnjccrkkfgm4uynroeq

Securing the Node of an Active Network [chapter]

Zhaoyu Liu, Roy H. Campbell, M. Dennis Mickunas
2000 The Kluwer International Series in Engineering and Computer Science  
The secure node architecture includes an Active Node Operating System Security API, an Active Security Guardian, and Quality of Protection (QoP) provisions.  ...  The architecture supports highly customized and situational policies created by users and applications dynamically.  ...  Part of the system is presented in Section 3.1, Section 3.2 and Section 3.3. The authors would also like to thank Jalal Al-Muhtadi for the useful discussions on NodeOS security API design.  ... 
doi:10.1007/978-1-4419-8648-1_11 fatcat:yey32p26vbdlvh2vtuzy7yp2pi

A safety-oriented platform for Web applications

R.S. Cox, J.G. Hansen, S.D. Gribble, H.M. Levy
2006 2006 IEEE Symposium on Security and Privacy (S&P'06)  
The Web browser has become the dominant interface to a broad range of applications, including online banking, Web-based email, digital media delivery, gaming, and ecommerce services.  ...  As a consequence, they fail to provide adequate isolation across applications, exposing both users and Web services to attack. Browser Operating System syscalls physical display sandbox  ...  This work was supported in part by the National Science Foundation under grants CNS-0430477, CCR-0326546, and ANI-0132817, by an Alfred P.  ... 
doi:10.1109/sp.2006.4 dblp:conf/sp/CoxGLH06 fatcat:6mbumco6brhlrjzk56ao22eney

COVID-X D2.2 – First Sandbox Implementation and Services Provision [article]

2021 Zenodo  
D2.2 – First Sandbox Implementation and Services Provision  ...  Overview of the Sandbox Architecture -Release A The Sandbox is based on a highly modular architecture, built as a collection of microservices, following the Service-Oriented Design approach, as extensively  ...  The development of the internal Sandbox services has followed the Service-Oriented Architecture approach, described in D2.1, as well as the best practices of the CI/CD process.  ... 
doi:10.5281/zenodo.4775464 fatcat:tqxzx2suy5a5lnfvkhsezjqbwu

Intelligent and Autonomous Management in Cloud-Native Future Networks—A Survey on Related Standards from an Architectural Perspective

Qiang Duan
2021 Future Internet  
Cloud-native network design, which leverages network virtualization and softwarization together with the service-oriented architectural principle, is transforming communication networks to a versatile  ...  It becomes critical that the various management technologies are applied on the foundation of a consistent architectural framework with a holistic vision.  ...  Data Availability Statement: Not Applicable, the study does not report any data. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/fi13020042 fatcat:cdgg7urssnfg3ojxscyi3b5uo4

D.2.3 - Final Sandbox Implementation and Services Provision [article]

2021 Zenodo  
This deliverable presents the final release of the COVID-X Sandbox and describes the services offered, including data ingestion, annotation, harmonization, visualization, federated learning and validation  ...  , interoperable data access and retrieval, API connectivity and managemet.  ...  Update of the Sandbox Architecture -Release B COVID-X Sandbox Architecture COVID-X Sandbox is built as a collection of microservices, following the Service-Oriented Design approach, as initially described  ... 
doi:10.5281/zenodo.5642489 fatcat:m7skszvyjvev3p5gqolr2zucbe

CORBEL Prototype implementation of distributed automated data access request, review and authorization and delivery systems

Mikael Linden, Jan-Willem Boiten, Melanie Courtot, Petr Holub, Gert-Jan van de Geijn, David van Enckevort, Ilkka Lappalainen, Tommi Nyrönen, Helen Parkinson, Robert Reihs, Alexander Senf, Dylan Spalding (+5 others)
2019 Zenodo  
This deliverable describes research infrastructures' prototypes for granting a researcher an authorisation to access research data encouraging secondary use of data that is already collected.  ...  This deliverable further describes prototypes for delivering the decision on the granted access rights to the environment that enforces access control.  ...  Example of an access control matrix. A column of an access control matrix is called an access control list.  ... 
doi:10.5281/zenodo.3238496 fatcat:laeaoxmtw5cjpb3cffa2c2jqhu

A decade of OS access-control extensibility

Robert N. M. Watson
2013 Communications of the ACM  
a Decade of oS access-control extensibility movement from multiuser computing toward single-user devices with complex application models.  ...  This article first describes the context and challenges for access-control extensibility and high-level framework design, then turns to practical experience deploying security policies in several framework-based  ...  ACM CTO Roundtable on Mobile Devices in the Enterprise Mache Creeger  ... 
doi:10.1145/2408776.2408792 fatcat:bifeu3atibdb7gzq3jjzcz7cre

Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution for Developing Secure Information Systems [chapter]

Haralambos Mouratidis, Michael Weiss, Paolo Giorgini
2005 Lecture Notes in Computer Science  
In this paper we propose an agent oriented security pattern language and we discuss how it can be used together with the Tropos methodology to develop secure information systems.  ...  This allows us to gain a deeper understanding of the patterns and their relationships, and thus to assess the completeness of the language.  ...  An agency is most likely exposed to a large number of malicious agents that will try to gain unauthorized access to it.  ... 
doi:10.1007/11568322_15 fatcat:hp73levugbfwnfyrsqqr3yz2ri

A Flexible Machine Learning-Aware Architecture for Future WLANs [article]

Francesc Wilhelmi, Sergio Barrachina-Muñoz, Boris Bellalta, Cristina Cano, Anders Jonsson, Vishnu Ram
2020 arXiv   pre-print
Finally, we showcase the superiority of the architecture through an ML-enabled use case for future networks.  ...  Lots of hopes have been placed on Machine Learning (ML) as a key enabler of future wireless networks.  ...  Finally, it is worth pointing out the role of the sandbox, which can be mainly twofold (shown in orange): 1) Generate data for training: the sandbox can act as a source in the ML pipeline by generating  ... 
arXiv:1910.03510v3 fatcat:ixv7msbwhnho7d7d64builtv7e


Mickaël Salaün, Marion Daubignard, Hervé Debar
2016 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16  
Our userland access control framework only relies on the ability of user to organize data in directories. Thus, it is easily configurable and requires very little user interaction once set up.  ...  Average users need realistic and practical solutions to enable them to mitigate the consequences of a security breach in terms of data leakage.  ...  In this section, we introduce definitions formalizing the access control policy enforced in StemJail. Role.  ... 
doi:10.1145/2897845.2897912 dblp:conf/ccs/SalaunDD16 fatcat:ee6b2odzfbeqbimgdnuivl2vbq
« Previous Showing results 1 — 15 out of 1,813 results