Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








16,453 Hits in 4.8 sec

Subject Switching Algorithms for Access Control in Federated Databases [chapter]

Jacqueline Yang, Duminda Wijesekera, Sushil Jajodia
2002 Database and Application Security XV  
Authentication in federated database systems present difficulties because the autonomously operated components may not know the identity of federation users.  ...  One proposed solution is subject switching, where the federation translates the federated users identity to that of an agreed upon component subject.  ...  Section 3 presents the concept of and algorithms for subject switching. It further shows why subject switching is not always possible.  ... 
doi:10.1007/978-0-387-35587-0_5 fatcat:y5ko54pflrgujdgguxyi6rjthe

Towards Secure XML Federations [chapter]

Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
2003 IFIP Advances in Information and Communication Technology  
We point out several problems in applying existing access control schemes and give our solutions.  ...  First we show a logical architecture of XML federations, which is adapted from the common architecture of traditional federated databases according to the unique requirements of XML federations.  ...  Access control for XML documents is based on authorization rules consisting of subject, object, action, access, and other extensions.  ... 
doi:10.1007/978-0-387-35697-6_10 fatcat:lpp4yyhrlreijhgjnm4w4o4zla

Integration of distributed terminology resources to facilitate subject cross‐browsing for library portal systems

Libo Eric Si, Ann O'Brien, Steve Probets, Vanda Broughton
2010 ASLIB Proceedings  
Purpose: To develop a prototype middleware framework between different terminology resources in order to provide a subject cross-browsing service for library portal systems.  ...  order to facilitate subject cross-browsing.  ...  The database registry is used to enable the federated search service to use mapped terms to search against the relevant databases using these mapped terms.  ... 
doi:10.1108/00012531011074663 fatcat:5o3semucjbar3gpx5v2s4f62wm

Technical sessions

2007 2007 12th IEEE Symposium on Computers and Communications  
This paper investigates three joint call admission control algorithms (JCAC) for heterogeneous cellular networks.  ...  In this paper we aim to present the first, to the best of our knowledge, link load control mechanism for the SAA, based on modification of Pareto distribution parameters, allowing for reduction in line  ...  Our approach is to utilize the flexible policy system used in SELinux that allows for custom rules to be defined to provide other access control requirements.  ... 
doi:10.1109/iscc.2007.4381658 fatcat:fu7k2cap6bct5edk63zejhtk7q

Optimized Workflow Authorization in Service Oriented Architectures [chapter]

Martin Wimmer, Martina-Cezara Albutiu, Alfons Kemper
2006 Lecture Notes in Computer Science  
In this paper we present our approach for consolidating the access control of (Web service) workflows.  ...  For example, hitherto monolithic enterprise resource planning systems (ERP) are decomposed into Web services which are then again orchestrated in terms of Web service workflows, bringing about higher levels  ...  With regard to distributed Web service invocations, access control usually relies on a federated identity management, e.g., realized via WS-Federation and SAML.  ... 
doi:10.1007/11766155_3 fatcat:moukvfytvre35mhppkwlrobo6u

Adapting to Urban Warfare

Andy Ceranowicz, Mark Torpey, Amy E. Henninger
2005 The Journal of Defence Modeling and Simulation: Applications, Methodology, Technology  
Embedding cultural features within the database in the form of building functions and other building attributes allows the civilian entities to automatically plan their movements based on generic daily  ...  These characteristics pose significant challenges for simulation designers.  ...  Dan Speicher of Lockheed Martin developed the clutter and the intersection control algorithms. Ke-Thia Yao, Dennis Allard, Brian Barrett, and Gene Wagenbreth of ISI developed the distributed loggers.  ... 
doi:10.1177/154851290500200102 fatcat:bonqrsdfmbgkhakos4xwej6mb4

Recent Advances in Access Control Models [chapter]

Sushil Jajodia, Duminda Wijesekera
2002 Database and Application Security XV  
We also discuss the recent work on policy algebras and subject identity issues in secure federations.  ...  implementations; models that incorporate richer semantics for access control in emerging Internet applications. such as adding provisions; and models for XML documents.  ...  A viable alternative to this problem is subject switching, where a federated layer interprets data supplied by the components and switches the identity of the subjects to those of subjects in participating  ... 
doi:10.1007/978-0-387-35587-0_1 fatcat:n5pfsdcm5zggjogelntkqxdkuu

Answers to Written Labs [chapter]

2018 CISSP, Eighth Edition  
Availability is the concept that authorized subjects are granted timely and uninterrupted access to objects. The term CIA Triad is used to indicate the three key components of a security solution. 2.  ...  In addition, backup personnel should be trained for each key BCP role. 5.  ...  Tailoring refers to modifying the list of selected baseline controls for some systems that have different requirements. Chapter 6: Cryptography and Symmetric Key Algorithms 1.  ... 
doi:10.1002/9781119549567.app2 fatcat:qor7r3hjmzcspponjpsfhzgisa

Recent Advances in Access Control Models [chapter]

Sushil Jajodia
2003 Lecture Notes in Computer Science  
We also discuss the recent work on policy algebras and subject identity issues in secure federations.  ...  implementations; models that incorporate richer semantics for access control in emerging Internet applications. such as adding provisions; and models for XML documents.  ...  requestor's knowledge, to those occurring in subject-switching algorithms proposed in [Yang et al., 2001 ].  ... 
doi:10.1007/978-3-540-45160-0_1 fatcat:t2shtdvjzzavlcwwqnpnyca3i4

Patenting Health-Related Databases and Information in Australia

Charles Lawson
2005 Bond Law Review  
In these circumstances a patent may be more desirable to those creating and exploiting databases, while posing more significant restrictions on access and use of the database information.  ...  In particular, patents have the potential to control the use and re-use of information, prevent independent invention and re-engineering of databases and have no 'fair use' exemption.  ...  United States Court of Appeals for the Federal Circuit found a patent for an invention that added telephone user information to a database using a mathematical algorithm (data gathering) that could then  ... 
doi:10.53300/001c.5477 fatcat:c3nvkobepzfothh7ors55sattq

The Formation Method of Recommendations in the Process of Scientific Peer Review of Mathematical Papers

Alexander M. Elizarov, Shamil Khaydarov, Evgeny K. Lipachev
2019 Conference on Scientific Services & Internet  
For each expert, using automatic search methods for citation databases, a profile has been generated that includes various classification codes, in particular, Mathematics Subject Classification 2010 (  ...  For this, a database of experts in various areas of mathematics has been created in the journal's information system.  ...  In 2015, the editors of the journal switched to the publishing platform Open Journal Systems [5, 7] , and this algorithm was modified taking into account the technical requirements of OJS [6] .  ... 
dblp:conf/ssi/ElizarovKL19 fatcat:e3z5kzgps5h5pil4cil6tkilca

PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services

Yiannis Verginadis, Antonis Michalas, Panagiotis Gouvas, Gunther Schiefer, Gerald Hübsch, Iraklis Paraskakis
2015 Proceedings of the 5th International Conference on Cloud Computing and Services Science  
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services.  ...  In this paper, we outline significant security challenges presented when migrating to a cloud environment and propose PaaSword -a novel holistic, data privacy and security by design, framework that aspires  ...  To implement the dynamic change of context parameters in a static access control model, we will use the, so-called, context switches.  ... 
doi:10.5220/0005489302060213 dblp:conf/closer/VerginadisMGSHP15 fatcat:ufkcxotuwzgrfc3rldabixxf5q

A Survey of Data Security: Practices from Cybersecurity and Challenges of Machine Learning [article]

Padmaksha Roy, Jaganmohan Chandrasekaran, Erin Lanus, Laura Freeman, Jeremy Werner
2023 arXiv   pre-print
This survey aims to present background information for experts in both domains in topics such as cryptography, access control, zero trust architectures, homomorphic encryption, differential privacy for  ...  machine learning, and federated learning to establish shared foundations and promote advancements in data security.  ...  In mandatory access control (MAC), the policy determines which subjects may access which objects and subjects may not pass on granted access rights to unauthorized subjects.  ... 
arXiv:2310.04513v3 fatcat:3n2y7tprofezjfckbhvzdwrw2a

Exploiting Information-centric Networking to Federate Spatial Databases

Andrea Detti, Giulio Rossi, Nicola Blefari Melazzi
2019 IEEE Access  
This paper explores the methodologies, challenges, and expected advantages related to the use of the information-centric network (ICN) technology for federating spatial databases.  ...  In this work, we present an architecture that is able to federate spatial databases and evaluate its performance using a real data set coming from OpenStreetMap within a heterogeneous federation formed  ...  ACKNOWLEDGMENT The document reflects only the author's view, European Commission and Japanese MIC are not responsible for any use that may be made of the information it contains.  ... 
doi:10.1109/access.2019.2953043 fatcat:qgwe6ifvcjbebb625obekyp3ya

Research on Access Control in Cloud Storage System: From Single to Multi-Clouds

Zhijie Fan
2018 American Journal of Software Engineering and Applications  
The key technologies introduce Ciphertext-Policy Attribute-Based Encryption algorithm(CP-ABE), ontology based attributes mapping, algebra based policies integration, solutions for identification, access  ...  The access control researches here refer to cipher-text and cross-domain access control in cloud storage system.  ...  CP-ABE algorithm is considered as the most suitable technology which can be applied in cipher text access control in cloud storage system, for the reason that the data owner can construct access policy  ... 
doi:10.11648/j.ajsea.20180701.11 fatcat:inq3arpscndbbg45rhivqfv6am
« Previous Showing results 1 — 15 out of 16,453 results