Showing 1 - 10 results of 10 for search '"access control"', query time: 0.07s Refine Results
  1. 1

    TC-enabled and distributed cloud computing access control model by Halboob, Waleed, Mahmod, Ramlan, Alghathbar, Khaled S., Mamat, Ali

    Published 2014
    “…Controlling access to the cloud computing services involves new scalability and security challenges that cannot be directly addressed by traditional access control solutions. In other words, cloud computing access control requires establishing a trust between users, service provider and provided services in a scalable manner. …”
    Article
  2. 2

    Temporal, delegable and cheap update access control to published XML documents. by Halboob, Waleed, Mamat, Ali, Mahmod, Ramlan, Khan, Muhammad Khurram

    Published 2013
    “…Providing access control for published XML documents on the Web is an important topic. …”
    Get full text
    Article
  3. 3

    Trusted-based scalable access control model for broadcast XML documents. by Halboob, Waleed, Mamat, Ali, Mahmod, Ramlan, Alghathbar, Khaled S., Khan, Muhammad Khurram

    Published 2013
    “…XML language is becoming a de facto standard for representing and transmitting data on the web so controlling access to XML documents is an important issue. Several XML access control approaches have been proposed to control the access of the published XML documents but these approaches still cannot scale well wim increased system and management workload because they specify and enforce their access control policies in centralized servers. …”
    Get full text
    Article
  4. 4

    Aspect oriented approach to improvement role based access control systems by Hazaa, Muneer A., Abd Ghani, Abdul Azim, Mamat, Ali, Ibrahim, Hamidah

    Published 2009
    “…As a case study, we present an aspect-oriented design framework for CORBA Access Control subsystem that supports different role-based access control models.…”
    Get full text
    Conference or Workshop Item
  5. 5

    Push-based XML access control policy languages: a review by Halboob, Waleed Abduljabbar Mohammed, Mamat, Ali, Mahmod, Ramlan

    Published 2014
    “…Several access control policy languages have been proposed for specifying access control policies for push-based XML access control systems. …”
    Get full text
    Conference or Workshop Item
  6. 6

    Secure role based access control systems using aspect-orientation designing by Hazaa, Muneer A., Abd Ghani, Abdul Azim, Mamat, Ali, Ibrahim, Hamidah

    Published 2009
    “…Using role-based access control (RBAC) as an example, currently it supports role hierarchy, static separation of duty relations, and dynamic separation of duty relations. …”
    Get full text
    Conference or Workshop Item
  7. 7

    A distributed push-based XML access control model for better scalability by Halboob, Waleed Abduljabbar Mohammed, Mamat, Ali, Mahmod, Ramlan

    Published 2008
    “…XML access control is a non-trivial topic as XML language becomes a standard for data representation and transmission on the Web. …”
    Get full text
    Conference or Workshop Item
  8. 8

    Event correlation, extra information and merged policies approaches for integrating intrusion detection and access control systems. by Halboob, Waleed, Alghathbar, Khaled S., Mamat, Ali, Mahmod, Ramlan, Shamsuddin, Solahuddin

    Published 2013
    “…This survey investigates the connection between the intrusion detection and access control systems and then it reviews the existing approaches for integrating them. …”
    Get full text
    Article
  9. 9

    A compact bit string accessibility map for secure XML query processing by Mirabi, Meghdad, Ibrahim, Hamidah, Udzir, Nur Izura, Mamat, Ali

    Published 2012
    “…One of the challenging issues related to specifying a fine-grained access control on the XML data is how to implement the accessibility map in a compact format with minimum affect on the XML query processing. …”
    Get full text
    Article
  10. 10

    A dynamic compressed accessibility map for secure XML querying and updating by Mirabi, Meghdad, Ibrahim, Hamidah, Fathi, Leila, Udzir, Nur Izura, Mamat, Ali

    Published 2015
    “…By specifying a fine-grained access control on the XML data, an accessibility map is required to determine the accessibility of XML nodes for a specific subject (e.g. user or role) under a specific action (e.g. read or write). …”
    Get full text
    Article