A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Subject Switching Algorithms for Access Control in Federated Databases
[chapter]
2002
Database and Application Security XV
Authentication in federated database systems present difficulties because the autonomously operated components may not know the identity of federation users. ...
One proposed solution is subject switching, where the federation translates the federated users identity to that of an agreed upon component subject. ...
Section 3 presents the concept of and algorithms for subject switching. It further shows why subject switching is not always possible. ...
doi:10.1007/978-0-387-35587-0_5
fatcat:y5ko54pflrgujdgguxyi6rjthe
Towards Secure XML Federations
[chapter]
2003
IFIP Advances in Information and Communication Technology
We point out several problems in applying existing access control schemes and give our solutions. ...
First we show a logical architecture of XML federations, which is adapted from the common architecture of traditional federated databases according to the unique requirements of XML federations. ...
Access control for XML documents is based on authorization rules consisting of subject, object, action, access, and other extensions. ...
doi:10.1007/978-0-387-35697-6_10
fatcat:lpp4yyhrlreijhgjnm4w4o4zla
Integration of distributed terminology resources to facilitate subject cross‐browsing for library portal systems
2010
ASLIB Proceedings
Purpose: To develop a prototype middleware framework between different terminology resources in order to provide a subject cross-browsing service for library portal systems. ...
order to facilitate subject cross-browsing. ...
The database registry is used to enable the federated search service to use mapped terms to search against the relevant databases using these mapped terms. ...
doi:10.1108/00012531011074663
fatcat:5o3semucjbar3gpx5v2s4f62wm
Technical sessions
2007
2007 12th IEEE Symposium on Computers and Communications
This paper investigates three joint call admission control algorithms (JCAC) for heterogeneous cellular networks. ...
In this paper we aim to present the first, to the best of our knowledge, link load control mechanism for the SAA, based on modification of Pareto distribution parameters, allowing for reduction in line ...
Our approach is to utilize the flexible policy system used in SELinux that allows for custom rules to be defined to provide other access control requirements. ...
doi:10.1109/iscc.2007.4381658
fatcat:fu7k2cap6bct5edk63zejhtk7q
Optimized Workflow Authorization in Service Oriented Architectures
[chapter]
2006
Lecture Notes in Computer Science
In this paper we present our approach for consolidating the access control of (Web service) workflows. ...
For example, hitherto monolithic enterprise resource planning systems (ERP) are decomposed into Web services which are then again orchestrated in terms of Web service workflows, bringing about higher levels ...
With regard to distributed Web service invocations, access control usually relies on a federated identity management, e.g., realized via WS-Federation and SAML. ...
doi:10.1007/11766155_3
fatcat:moukvfytvre35mhppkwlrobo6u
Adapting to Urban Warfare
2005
The Journal of Defence Modeling and Simulation: Applications, Methodology, Technology
Embedding cultural features within the database in the form of building functions and other building attributes allows the civilian entities to automatically plan their movements based on generic daily ...
These characteristics pose significant challenges for simulation designers. ...
Dan Speicher of Lockheed Martin developed the clutter and the intersection control algorithms. Ke-Thia Yao, Dennis Allard, Brian Barrett, and Gene Wagenbreth of ISI developed the distributed loggers. ...
doi:10.1177/154851290500200102
fatcat:bonqrsdfmbgkhakos4xwej6mb4
Recent Advances in Access Control Models
[chapter]
2002
Database and Application Security XV
We also discuss the recent work on policy algebras and subject identity issues in secure federations. ...
implementations; models that incorporate richer semantics for access control in emerging Internet applications. such as adding provisions; and models for XML documents. ...
A viable alternative to this problem is subject switching, where a federated layer interprets data supplied by the components and switches the identity of the subjects to those of subjects in participating ...
doi:10.1007/978-0-387-35587-0_1
fatcat:n5pfsdcm5zggjogelntkqxdkuu
Answers to Written Labs
[chapter]
2018
CISSP, Eighth Edition
Availability is the concept that authorized subjects are granted timely and uninterrupted access to objects. The term CIA Triad is used to indicate the three key components of a security solution. 2. ...
In addition, backup personnel should be trained for each key BCP role. 5. ...
Tailoring refers to modifying the list of selected baseline controls for some systems that have different requirements. Chapter 6: Cryptography and Symmetric Key Algorithms 1. ...
doi:10.1002/9781119549567.app2
fatcat:qor7r3hjmzcspponjpsfhzgisa
Recent Advances in Access Control Models
[chapter]
2003
Lecture Notes in Computer Science
We also discuss the recent work on policy algebras and subject identity issues in secure federations. ...
implementations; models that incorporate richer semantics for access control in emerging Internet applications. such as adding provisions; and models for XML documents. ...
requestor's knowledge, to those occurring in subject-switching algorithms proposed in [Yang et al., 2001 ]. ...
doi:10.1007/978-3-540-45160-0_1
fatcat:t2shtdvjzzavlcwwqnpnyca3i4
Patenting Health-Related Databases and Information in Australia
2005
Bond Law Review
In these circumstances a patent may be more desirable to those creating and exploiting databases, while posing more significant restrictions on access and use of the database information. ...
In particular, patents have the potential to control the use and re-use of information, prevent independent invention and re-engineering of databases and have no 'fair use' exemption. ...
United States Court of Appeals for the Federal Circuit found a patent for an invention that added telephone user information to a database using a mathematical algorithm (data gathering) that could then ...
doi:10.53300/001c.5477
fatcat:c3nvkobepzfothh7ors55sattq
The Formation Method of Recommendations in the Process of Scientific Peer Review of Mathematical Papers
2019
Conference on Scientific Services & Internet
For each expert, using automatic search methods for citation databases, a profile has been generated that includes various classification codes, in particular, Mathematics Subject Classification 2010 ( ...
For this, a database of experts in various areas of mathematics has been created in the journal's information system. ...
In 2015, the editors of the journal switched to the publishing platform Open Journal Systems [5, 7] , and this algorithm was modified taking into account the technical requirements of OJS [6] . ...
dblp:conf/ssi/ElizarovKL19
fatcat:e3z5kzgps5h5pil4cil6tkilca
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services
2015
Proceedings of the 5th International Conference on Cloud Computing and Services Science
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services. ...
In this paper, we outline significant security challenges presented when migrating to a cloud environment and propose PaaSword -a novel holistic, data privacy and security by design, framework that aspires ...
To implement the dynamic change of context parameters in a static access control model, we will use the, so-called, context switches. ...
doi:10.5220/0005489302060213
dblp:conf/closer/VerginadisMGSHP15
fatcat:ufkcxotuwzgrfc3rldabixxf5q
A Survey of Data Security: Practices from Cybersecurity and Challenges of Machine Learning
[article]
2023
arXiv
pre-print
This survey aims to present background information for experts in both domains in topics such as cryptography, access control, zero trust architectures, homomorphic encryption, differential privacy for ...
machine learning, and federated learning to establish shared foundations and promote advancements in data security. ...
In mandatory access control (MAC), the policy determines which subjects may access which objects and subjects may not pass on granted access rights to unauthorized subjects. ...
arXiv:2310.04513v3
fatcat:3n2y7tprofezjfckbhvzdwrw2a
Exploiting Information-centric Networking to Federate Spatial Databases
2019
IEEE Access
This paper explores the methodologies, challenges, and expected advantages related to the use of the information-centric network (ICN) technology for federating spatial databases. ...
In this work, we present an architecture that is able to federate spatial databases and evaluate its performance using a real data set coming from OpenStreetMap within a heterogeneous federation formed ...
ACKNOWLEDGMENT The document reflects only the author's view, European Commission and Japanese MIC are not responsible for any use that may be made of the information it contains. ...
doi:10.1109/access.2019.2953043
fatcat:qgwe6ifvcjbebb625obekyp3ya
Research on Access Control in Cloud Storage System: From Single to Multi-Clouds
2018
American Journal of Software Engineering and Applications
The key technologies introduce Ciphertext-Policy Attribute-Based Encryption algorithm(CP-ABE), ontology based attributes mapping, algebra based policies integration, solutions for identification, access ...
The access control researches here refer to cipher-text and cross-domain access control in cloud storage system. ...
CP-ABE algorithm is considered as the most suitable technology which can be applied in cipher text access control in cloud storage system, for the reason that the data owner can construct access policy ...
doi:10.11648/j.ajsea.20180701.11
fatcat:inq3arpscndbbg45rhivqfv6am
« Previous
Showing results 1 — 15 out of 16,453 results