• Aucun résultat trouvé

Purpose-based Access Control

XPACML eXtensible Privacy Access Control Markup Language

XPACML eXtensible Privacy Access Control Markup Language

... policy based privacy manage- ment approach, and thus we naturally selected XACML as a language to express privacy aware access control ...ces control-based ...policy access ...

6

Model-Based Tests for Access Control Policies

Model-Based Tests for Access Control Policies

... original purpose of mutation testing [4] is to assess the quality of a test suite in terms of failure ...to access control policies ...of access control pol- icy test cases can be ...

11

Authentication and access control based on distributed ledger technology

Authentication and access control based on distributed ledger technology

... general purpose ABAC ...an access request in order to access ...general purpose RBAC method that can be used in all types of distributed applications (DApps) ...user access by creating, ...

9

D.3.2 – State of the art of purpose-based, usage control approaches

D.3.2 – State of the art of purpose-based, usage control approaches

... of access rights, for better managing the increased complexity of (tuple-level) fine-grained ...shared, based on both direct and indirect trusted relationships between ...

14

Reputation trust mechanism under the organizational-based access control model

Reputation trust mechanism under the organizational-based access control model

... this purpose, OrBAC defines two abstraction levels: concrete and ...that control activation of rules expressed in the access control ...

17

Evaluating the comprehensive complexity of authorization-based access control policies using quantitative metrics

Evaluating the comprehensive complexity of authorization-based access control policies using quantitative metrics

... SELinux access control models, and with the purpose of putting in practice the metrics defined in Section ...SELinux access control mechanism is primar- ily based on the TE (type ...

13

Context-Aware Access Control for RDF Graph Stores

Context-Aware Access Control for RDF Graph Stores

... targets access control in the mobile Web of Data: we need therefore a context model compliant with the Web of Data paradigm ...context-aware access control framework adopts PRISSMA, a ...

7

Social Semantic Network-Based Access Control

Social Semantic Network-Based Access Control

... context-aware access control framework adopts PRISSMA, a lightweight vocabulary originally designed for context-aware adaptation of RDF data ...context-based access policies, and we therefore ...

36

A new scalable authentication and access control mechanism for 5G-based IoT

A new scalable authentication and access control mechanism for 5G-based IoT

... are based on the AKA protocol. The purpose of these AAC mechanisms is to establish mutual authentications between the UE and its corresponding HN and to set session keys in the UE and SN to secure the ...

34

Access control in IoT environments: Feasible scenarios

Access control in IoT environments: Feasible scenarios

... restrain access to information. This article will focus on access control and authentication mechanisms as well as supporting the cryptography algorithms in constrained ...

7

Access Control for HTTP Operations on Linked Data

Access Control for HTTP Operations on Linked Data

... Abstract. Access control is a recognized open issue when interacting with RDF using HTTP ...basic access control lists, thus resulting in limited policy ...

16

On the isofunctionality of network access control lists

On the isofunctionality of network access control lists

... network Access Control Lists (ACLs) refers to the task of authoring and maintaining security rules associated to network equipment, such as routers, switches and ...general-purpose access ...

7

The case for Access Control on XML relationships

The case for Access Control on XML relationships

... ) Figure 6. Impact of RA on the motivating example. Figure 6 delivers a different view of the measurements. It pictures the total cost of each algorithm’s phase and the extra cost incurred by relationship authorizations ...

24

A blockchain-based access control scheme

A blockchain-based access control scheme

... the access rights for each of his data resource (file, directory, ...cific access control ...to access certain resources, as all blockchain- specific operations are considered as secure and ...

9

Database access control within a Java application

Database access control within a Java application

... Object-oriented applications and database information must be bridged. Bridging is usually accomplished through the use of an Object/Relational Mapping Product such as TopLink. The development of an object-oriented ...

8

Access control in full-duplex wireless networks.

Access control in full-duplex wireless networks.

... The access mechanism of our proposed MAC protocol implements features similar to those of the random access in CSMA/CA, such as random back-off, freezing and countdowns ...

105

Federated Access Control in Service Oriented Architecture

Federated Access Control in Service Oriented Architecture

... The access control of the shared services becomes an essential requirement for a secure federation of ...to access the services of others with his autho- rization information or ...different ...

10

Verifying Resource Access Control on Mobile Interactive Devices

Verifying Resource Access Control on Mobile Interactive Devices

... to access control policies specified ...resource access control framework than Igarashi and Kobayashi, and without explicit notions of resources, but are able to ensure through a static ...

26

A Social Semantic Web Access Control Model

A Social Semantic Web Access Control Model

... The Access Condition grants or restricts the access to the ...the access is granted to the ...the access is denied, we introduce the property hasCat- ...the access condition, and they ...

13

An Access Control Model for Web Databases

An Access Control Model for Web Databases

... enforces access control based on business application logic rather than primitive reads and ...database access control can grant or revoke access to resources only according to ...

9

Show all 10000 documents...

Sujets connexes