Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,709 Hits in 4.2 sec

A Cross - Domain Role Mapping and Authorization Framework for RBAC in Grid Systems

G. Geethakumari, Atul Negi, V. N. Sastry
2009 International Journal of Computer Science and Applications  
Access control in such an environment is still an open problem. The much standardized Role Based Access Control (RBAC) is yet to be fully utilized in a multi domain grid environment like the Grids.  ...  Here, we present an architectural framework for adaptation and implementation of RBAC for grid access control.  ...  We have also incorporated Role Based Delegation and Revocation models for multi-domain grid environments in the implementation mechanism.  ... 
dblp:journals/ijcsa/GeethakumariNS09 fatcat:ajqh5bmomjg23jupsna5mmxn2i

Policy and Context Management in Dynamically Provisioned Access Control Service for Virtualized Cloud Infrastructures

Canh Ngo, Peter Membrey, Yuri Demchenko, Cees de Laat
2012 2012 Seventh International Conference on Availability, Reliability and Security  
It applies XACML-based RBAC model for the flexible authorization policy configuration and management.  ...  New architectural models should allow multi-provider heterogeneous services environment that can be delivered to organizational customers representing multiple user groups.  ...  Access Control Architecture The involvement of multi-providers, multi-tenants across multi-domains resources of the Virtualised Infrastructure Service Provisioning model requires an access control infrastructure  ... 
doi:10.1109/ares.2012.81 dblp:conf/IEEEares/NgoMDL12 fatcat:6azh4c5slfgkdbrzhqpxsvrp5e

Intelligent Role-Based Access Control Model and Framework using Semantic Business Roles in Multi-domain Environments

Rubina Ghazal, Ahmad Kamran Malik, Nauman Qadeer, Basit Raza, Ahmad Raza Shahid, Hani Alquhayz
2020 IEEE Access  
The proposed I-RBAC model is mathematically described and the overall I-RBAC framework and its implementation architecture is explained.  ...  Today's rapidly developing communication technologies and dynamic collaborative business models made the security of data and resources more crucial than ever especially in multi-domain environments like  ...  There are certain issues for RBAC in collaborative multi-domain environment.  ... 
doi:10.1109/access.2020.2965333 fatcat:m55xr7zw6nfafpl5omphhnqzqq

T-RBAC based Multi-domain Access Control Method in Cloud

Dapeng Xiong, Liang Chen
2017 Network Protocols and Algorithms  
Comparative trial show that new policy had an advantage in flexibility and availability of multi-domain access control model.  ...  In order to improve the deficiency of the current multi domain access control in timeliness and flexibility. This paper put forward a dynamic access control policy on the basis of task driving idea.  ...  Acknowledgement This research has been supported by National High Technology Research and Development Application of China (2012AA012902) and "HGJ" National Major Technological Projects (2013ZX01045-004  ... 
doi:10.5296/npa.v8i4.10411 fatcat:gbmzmnehafd4nhcfgj6s4imike

Agent-Based Semantic Role Mining for Intelligent Access Control in Multi-Domain Collaborative Applications of Smart Cities

Rubina Ghazal, Ahmad Kamran Malik, Basit Raza, Nauman Qadeer, Nafees Qamar, Sajal Bhatia
2021 Sensors  
Significance and popularity of Role-Based Access Control (RBAC) is inevitable; however, its application is highly challenging in multi-domain collaborative smart city environments.  ...  We propose an Intelligent Role-based Access Control (I-RBAC) model that uses intelligent software agents for achieving intelligent access control in such highly dynamic multi-domain environments.  ...  Data Availability Statement: The SOC dataset used in this study is available online [8]. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s21134253 pmid:34206164 fatcat:tyiwvdahrngaban3zopi73y47m

Extending Role Based Access Control Model for Distributed Multidomain Applications [chapter]

Yuri Demchenko, Leon Gommans, Cees de Laat
2007 IFIP International Federation for Information Processing  
The paper provides implementation details on the use of XACML for finegrained access control policy definition for domain based resources organisation and roles assignments in RBAC-DM.  ...  It describes relations between the RBAC and the generic AAA access control models and defines combined RBAC-DM model for domain-based access control management and suggests mechanisms that can be used  ...  The authors believe that the proposed REAC-DM access control architecture for GCE/CRP and related technical solutions will also be useful to the wider community that has similar problems with managing  ... 
doi:10.1007/978-0-387-72367-9_26 fatcat:ltuvgu5kxjbshoymxrjwjm75um

ACaaS: Access Control as a Service for IaaS Cloud

Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn, Hadi Sharifi, Haiyong Xie
2013 2013 International Conference on Social Computing  
of Supporting RBAC for AWS -ACaaS RBAC model ACaaS Overview  The diversity of cloud services across a wide range of orgs and domains requires various security models and policies  However, major cloud  ...   Implemented a prototype system to provide RBAC services in AWS cloud platform through a web browser interface as well as web services  The core services of the system are implemented in Java based on  ... 
doi:10.1109/socialcom.2013.66 dblp:conf/socialcom/WuZASX13 fatcat:bqefdkmhvjfzjcrtj75vc753y4

Data Security Monitoring Platform in Cloud for Enterprise

Geng Yushui, Pang Shunpeng
2013 International Journal of Security and Its Applications  
The model proposed by this paper uses multi-tenancy SaaS(Software as Service) application architecture, RBAC (Role-Based policies Access Control) model and operation in the context of environmental perception  ...  Now most software systems in cloud platform use Multi -Tenancy architecture. A single software system serves for multiple client organization. All customers' data will not be stored in only one node.  ...  In a cloud computing environment, software application modes are based on the SaaS model. SaaS model is a single-instance and multi-user architecture.  ... 
doi:10.14257/ijsia.2013.7.6.07 fatcat:ls47dplocbcd7feetif7opapte

Security Architecture for Open Collaborative Environment [chapter]

Yuri Demchenko, Leon Gommans, Cees de Laat, Bas Oudenaarde, Andrew Tokmakoff, Martin Snijders, Rene van Buuren
2005 Lecture Notes in Computer Science  
The paper presents proposed Security Architecture for Open Collaborative Environment (OCE) being developed in the framework of the Collaboratory.nl (CNL) project with the intent to build a flexible, customer-driven  ...  The architecture is based on extended use of emerging Web Services and Grid security technologies combined with concepts from the generic Authentication Authorization and Accounting (AAA) and Role-based  ...  Acknowledgements This paper results from the Collaboratory.nl project, a research initiative that explores the possibilities of remote control and use of advanced lab facilities in a distributed and collaborative  ... 
doi:10.1007/11508380_60 fatcat:j55cno2pivexxbpfiapktnzzqy

Flexible Authorization with Decentralized Access Control Model for Grid Computing

Xinwen Zhang, Qi Li, Jean-Pierre Seifert, Mingwei Xu
2007 10th IEEE High Assurance Systems Engineering Symposium (HASE'07)  
We propose an access control scheme based on a group-based RBAC model for Grid computing environments.  ...  With the increasing complexity of dynamic and collaborative computing environments in Grid, security management has become a critical factor.  ...  RBAC-based approaches have been proposed for secure interoperation in multi-domain environments [13, 23] , where each domain deploys RBAC policies and a set of global access control policies are composed  ... 
doi:10.1109/hase.2007.29 dblp:conf/hase/ZhangLSX07 fatcat:iyv5vll6l5debomtbzuk22dqei

Scalable Multi-Tenant Authorization in Highly-Collaborative Cloud Applications

Samy Gerges, Sherif Khattab, Hesham Hassan, Fatma A Omara
2013 International Journal of Cloud Computing and Services Science (IJ-CLOSER)  
Scalability of online memory in RBAC multi-tenant authorization systems enables efficient software and hardware implementations.  ...  Authorization, usually implemented as role-based access control (RBAC), has been recently proposed as a consolidated, multi-tenant cloud service, whereby RBAC rules of the collaborating organizations are  ...  Scalability of online memory in RBAC multi-tenant authorization systems enables efficient software and potentially hardware implementations.  ... 
doi:10.11591/closer.v2i2.1665 fatcat:kkgut46merdjzkvksqkg6iokhy

Towards movement-aware access control

Maria Luisa Damiani, Claudio Silvestri
2008 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS - SPRINGL '08  
In this paper, we first discuss architectural issues related to the development of a multi-domain access control system based on GEO-RBAC.  ...  Following the experience of design of the GEO-RBAC model, in this paper we want to look at those models with a critical eye and point out open conceptual and architectural challenges.  ...  Multi-domain policy administration GEO-RBAC Admin [14] is the multi-domain administration model which has been specified to allow diverse organizations manage their own policy in an independent and simplified  ... 
doi:10.1145/1503402.1503410 dblp:conf/gis/DamianiS08 fatcat:sitb6gihdffivpcz7i23g6z66a

2L-RBACG: A new framework for resource access control in grid environments

Hakimeh Alemi Baktash, MohammadBagher Karimi, MohammadReza Meybodi, Asgarali Bouyer
2010 2010 Fifth International Conference on Digital Information Management (ICDIM)  
For this purpose, we propose a new access control framework which uses an extended two level RBAC model in Grid computing environments.  ...  With the increasing complexity of dynamic and collaborative computing environments in Grid, access control has become a critical factor.  ...  In step 6, the grid users can create a specific grid resource request by supplying subset of selected privileges. 2L-RBAC model and administrations 2L-RBAC model In contrast with RBAC96 model, 2L-RBAC  ... 
doi:10.1109/icdim.2010.5662244 dblp:conf/icdim/BaktashKMB10 fatcat:rxhz3efx2rf3xggudi435lo6h4

Enforcing Role-Based Access Controls in Software Systems with an Agent Based Service Oriented Approach

Feng Chen, Shaoyun Li, Hongji Yang
2007 2007 IEEE International Conference on Networking, Sensing and Control  
Although the RBAC model has been well accepted, it turns out to have some problems in applying RBAC to an existing system: an existing system is generally not organised in roles; it is very hard to add  ...  The architecture and working flow of the approach are presented and an example showing how to use the proposed framework and methodology is illustrated.  ...  Such environments are known as Multi-Agent Systems (MAS) [12] .  ... 
doi:10.1109/icnsc.2007.372826 dblp:conf/icnsc/ChenLY07 fatcat:it7b2lw5gvfqnfkny4vt6ryfvy

RBAC Architecture Design Issues in Institutions Collaborative Environment [article]

Muhammad Umar Aftab, Amna Nisar, Dr. Asif, Adeel Ashraf, Burhan Gill
2013 arXiv   pre-print
As lot of work was done in RBAC like for grouping, securing the system, ease of use, and for enterprise etc but no one apply all these concepts as a whole on institution level.  ...  So a proper architecture must be there for these kinds of systems, for providing an efficient and secure system.  ...  Hierarchical Institution RBAC Architectural Design in Collaborative Environment As discussed earlier, the paper is about the architectural design for institution RBAC in collaborative environment.  ... 
arXiv:1310.5962v1 fatcat:7uepspdylvf7bnfl54h2wdeigq
« Previous Showing results 1 — 15 out of 1,709 results