oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Trust-based dynamic access control in Web Services
Web Services中基于信任的动态访问控制*

YIN Xiao-ling,XIA Qi-shou,WANG Ru-chuan,
殷晓玲
,夏启寿,王汝传

计算机应用研究 , 2011,
Abstract: In Web Services system, dynamic nondeterministic user behavior makes the present access control model difficult to control user malicious behavior. So this paper proposed an access control model based on trust, which combined the security assertion markup language and extensible access control markup language, and adopted a confidence computing method based on loyalty as well. The result of simulation shows that access control method, which effectively prevents malicious behavior to realize dynamic access control, is universal, flexible and extensible.
Dynamic Modeling for Representing Access Control Policies Effect  [PDF]
Kambiz Ghazinour,Mehdi Ghayoumi
Computer Science , 2015,
Abstract: In large databases, creating user interface for browsing or performing insertion, deletion or modification of data is very costly in terms of programming. In addition, each modification of an access control policy causes many potential and unpredictable side effects which cause rule conflicts or security breaches that affect the corresponding user interfaces as well. While changes to access control policies in databases are inevitable, having a dynamic system that generates interface according to the latest access control policies become increasingly valuable. Lack of such a system leads to unauthorized access to data and eventually violates the privacy of data owners. In this work, we discuss a dynamic interface that applies Role Based Access Control (RBAC) policies as the output of policy analysis and limits the amount of information that users have access according to the policies defined for roles. This interface also shows security administrators the effect of their changes from the user's point of view while minimizing the cost by generating the interface automatically.
Verification of agent knowledge in dynamic access control policies  [PDF]
Masoud Koleini,Eike Ritter,Mark Ryan
Computer Science , 2014,
Abstract: We develop a modeling technique based on interpreted systems in order to verify temporal-epistemic properties over access control policies. This approach enables us to detect information flow vulnerabilities in dynamic policies by verifying the knowledge of the agents gained by both reading and reasoning about system information. To overcome the practical limitations of state explosion in model-checking temporal-epistemic properties, we introduce a novel abstraction and refinement technique for temporal-epistemic safety properties in ACTLK (ACTL with knowledge modality K) and a class of interesting properties that does fall in this category.
On Secure Distributed Implementations of Dynamic Access Control  [PDF]
Avik Chaudhuri
Computer Science , 2008,
Abstract: Distributed implementations of access control abound in distributed storage protocols. While such implementations are often accompanied by informal justifications of their correctness, our formal analysis reveals that their correctness can be tricky. In particular, we discover several subtleties in a standard protocol based on capabilities, that can break security under a simple specification of access control. At the same time, we show a sensible refinement of the specification for which a secure implementation of access control is possible. Our models and proofs are formalized in the applied pi calculus, following some new techniques that may be of independent interest. Finally, we indicate how our principles can be applied to securely distribute other state machines.
Dynamic Role-Based Access Control Model  [cached]
Jun Zheng,kun Qi Zhang,wen Shang Zheng,an Yu Tan
Journal of Software , 2011, DOI: 10.4304/jsw.6.6.1096-1102
Abstract: -With the rapid development of network and the coming of information age, access control is particularly important, role-based access control (RBAC) is an access control which is popular. RBAC authorizes and controls the roles corresponding to the users to operate the object. It solves problems of least privilege, separation of duties and so on. However, limited permissions are required to be executed by a certain sequence, that is, the permission owned by a user is controlled by other users’. To solve this problem, this paper proposed an improved model on the base of the original RBAC, not only to retain the original characteristics of RBAC but also solve a specific problem of some permissions which are needed to executed by sequential order, and the analysis shows that this scheme has better security, better flexibility, and can be well applied to the workflow system.
Dynamic Access Control of Remote File Directory Structure in Java ME Bluetooth Serial Communication
Java ME蓝牙串口通讯中异地文件目录结构的动态访问控制

LIANG Qi-Jun,WU Xi-Lan,LUO Hai-Ping,
梁旗军
,吴喜兰,罗海平

计算机系统应用 , 2010,
Abstract: In multi-terminal Java ME Bluetooth serial port communications, it is necessary to access and control remote file directory structure. To ensure that under the conditions of serial connections it is convenient and real-time to access the directory structure information, and locate the file accurately, the directory structure must also be controlled dynamically. To address these problems, this paper researches and designs the two-dimensional vector storage structure and access control methods, along with the application and the realization of the method in the Bluetooth serial port communication. The results of practical application show the effectiveness of dynamic access control.
Admission Control and Interference Management in Dynamic Spectrum Access Networks  [cached]
Jorge Martinez-Bauset,Vicent Pla,M. Jose Domenech-Benlloch,Diego Pacheco-Paramo
EURASIP Journal on Wireless Communications and Networking , 2010, DOI: 10.1155/2010/708029
Abstract: We study two important aspects to make dynamic spectrum access work in practice: the admission policy of secondary users (SUs) to achieve a certain degree of quality of service and the management of the interference caused by SUs to primary users (PUs). In order to limit the forced termination probability of SUs, we evaluate the Fractional Guard Channel reservation scheme to give priority to spectrum handovers over new arrivals. We show that, contrary to what has been proposed, the throughput of SUs cannot be maximized by configuring the reservation parameter. We also study the interference caused by SUs to PUs. We propose and evaluate different mechanisms to reduce the interference, which are based on simple spectrum access algorithms for both PUs and SUs and channel repacking algorithms for SUs. Numerical results show that the reduction can be of one order of magnitude or more with respect to the random access case. Finally, we propose an adaptive admission control scheme that is able to limit simultaneously the forced termination probability of SUs and what we define as the probability of interference. Our scheme does not require any configuration parameters beyond the probability objectives. Besides, it is simple to implement and it can operate with any arrival process and distribution of the session duration.
Admission Control and Interference Management in Dynamic Spectrum Access Networks  [cached]
Martinez-Bauset Jorge,Pla Vicent,Domenech-Benlloch MJose,Pacheco-Paramo Diego
EURASIP Journal on Wireless Communications and Networking , 2010,
Abstract: We study two important aspects to make dynamic spectrum access work in practice: the admission policy of secondary users (SUs) to achieve a certain degree of quality of service and the management of the interference caused by SUs to primary users (PUs). In order to limit the forced termination probability of SUs, we evaluate the Fractional Guard Channel reservation scheme to give priority to spectrum handovers over new arrivals. We show that, contrary to what has been proposed, the throughput of SUs cannot be maximized by configuring the reservation parameter. We also study the interference caused by SUs to PUs. We propose and evaluate different mechanisms to reduce the interference, which are based on simple spectrum access algorithms for both PUs and SUs and channel repacking algorithms for SUs. Numerical results show that the reduction can be of one order of magnitude or more with respect to the random access case. Finally, we propose an adaptive admission control scheme that is able to limit simultaneously the forced termination probability of SUs and what we define as the probability of interference. Our scheme does not require any configuration parameters beyond the probability objectives. Besides, it is simple to implement and it can operate with any arrival process and distribution of the session duration.
Role-based dynamic access control model for Web Services
基于角色的Web Services动态访问控制模型

WANG Wei-lin,ZHANG Lai-shun,ZHANG Yuan-yang,
王维林
,张来顺,张远洋

计算机应用 , 2006,
Abstract: The current access control models are mostly static and coarsely grained; they are not well-suited for the service-oriented Web Services environments where information access is dynamic. In order to solve this problem, a role-based dynamic access control (RBDAC) model for Web Services was proposed. The RBDAC model can activate role assignments and permission assignments based on context information, and make access control decision dynamically.
Integrated methods for Web Server Access Control
Integrated methods for Web Server Access Control
International Journal of Computer Trends and Technology , 2011,
Abstract: This paper introduces methods for web server access control framework for web security, which protects against illegal computer access to resources by granting different layers of privileges to different user roles. The role-based access control features are analyzed and implemented in the most recent versions of Java Application server and Point Base DB Server. RBAC features are categorized under three broad areas: user role assignment, supporting role relationships and credentials, and assignable privileges. When the user tries to access each web server that contains number of web documents that are linked to each other via hyper-link within the domain, each web server asks the user to follow the verification process even though the user is identical, and this prohibits the user from using the system efficiently. Role based access control method, which is the most suitable access control concept available now for the distributed web server based system within the domain, will be used in this paper. This paper also describes integration of the Generic Authorization and Access Control API (GAA-API) to provide dynamic intrusion detection and response for the Apache Web Server. The GAA-API is a generic interface which may be used to enable such dynamic authorization and intrusion response capabilities for many applications.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.