Showing 1 - 8 results of 8 for search '"access control"', query time: 0.14s Refine Results
  1. 1

    Access control in open distributed systems by Udzir, Nur Izura, Wood, Alan, Muda, Zaiton, Dehghantanha, Ali, Abdullah @ Selimun, Mohd Taufik, Abdullah, Azizol

    Published 2012
    “…In this paper, we discuss two conventional access control mechanisms-access control lists and capabilities-which can be incorporated in the Linda·model, and their suitability and implications on the flexibility of the model.…”
    Get full text
    Conference or Workshop Item
  2. 2

    Analysis of access control model for data security and privacy on multi-tenant SaaS by Duraisamy, Gunavathi, Abd Ghani, Abdul Azim, Zulzalil, Hazura, Abdullah, Azizol

    Published 2018
    “…This paper presents an analysis of existing role based access control models. We use evaluation criteria that outlined by NIST for access control system. …”
    Get full text
    Article
  3. 3

    Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling by Jamal, Fara, Abdullah, Mohd Taufik, Mohd Hanapi, Zurina, Abdullah, Azizol

    Published 2019
    “…To overcome this challenge, attribute-based encryption (ABE) technique, a promising cryptography method was introduced to support both data confidentiality and access control simultaneously. However, most of the ABE used single certification authority (CA) and disjoint attribute authority (AA) to verify user identity which can be a single point of failure. …”
    Get full text
    Article
  4. 4

    Model-based testing of access control requirement in multi-tenant application: an extensive life cycle by Duraisamy, Gunavathi, Abd Ghani, Abdul Azim, Zulzalil, Hazura, Abdullah, Azizol

    Published 2022
    “…Thus, in this paper, we have studied the existing testing process, the taxonomy of model-based testing and model-based testing steps and proposed an extensive lifecycle for model-based testing with detail activities and steps to be carried out in order to test and validate access control requirement for multi-tenant application.…”
    Article
  5. 5

    Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control by Jamal, Fara, Abdullah, Mohd Taufik, Mohd Hanapi, Zurina, Abdullah, Azizol

    Published 2020
    “…The first line of defence that prevents unauthorized access to the data is known as access control. Fine-grained access control using attribute-based encryption mechanisms can be enforced as the first line of defence on the untrusted cloud to forbid unauthorized access to the stored data. …”
    Article
  6. 6

    A high performance UCON and semantic-based authorization framework for grid computing by Ibrahim, Maizura, Ibrahim, Hamidah, Abdullah, Azizol, Latip, Rohaya

    Published 2016
    “…Authorization infrastructures are an important and integral part of grid computing which facilitate access control functions to protect resources. This paper presents an authorization framework that combines the usage control (UCON) model with semantic web technology. …”
    Get full text
    Article
  7. 7

    A high performance UCON and semantic-based authorization framework for grid computing by Ibrahim, Maizura, Ibrahim, Hamidah, Abdullah, Azizol, Latip, Rohaya

    Published 2016
    “…Authorization infrastructures are an important and integral part of grid computing which facilitate access control functions to protect resources.This paper presents an authorization framework that combines the usage control (UCON) model with semantic web technology.To our knowledge, an authorization framework that combines both the UCON and semantic web technology in one framework has not yet been previously proposed.As the UCON model combines traditional access control, trust management and digital rights management in a grid authorization infrastructure, its adoption enhances the capability of the authorization. …”
    Get full text
    Article
  8. 8

    Enhancing the performance of advanced fine-grained grid authorization system by Ibrahim, Maizura, Ibrahim, Hamidah, Abdullah, Azizol, Latip, Rohaya

    Published 2014
    “…Usage Control model (UCON) is a new emerging authorization framework that combined features of traditional access control, trust management and digital right management in one abstraction. …”
    Get full text
    Article