-
1
TC-enabled and distributed cloud computing access control model
Published 2014“…Controlling access to the cloud computing services involves new scalability and security challenges that cannot be directly addressed by traditional access control solutions. In other words, cloud computing access control requires establishing a trust between users, service provider and provided services in a scalable manner. …”
Article -
2
Temporal, delegable and cheap update access control to published XML documents.
Published 2013“…Providing access control for published XML documents on the Web is an important topic. …”
Get full text
Article -
3
Trusted-based scalable access control model for broadcast XML documents.
Published 2013“…XML language is becoming a de facto standard for representing and transmitting data on the web so controlling access to XML documents is an important issue. Several XML access control approaches have been proposed to control the access of the published XML documents but these approaches still cannot scale well wim increased system and management workload because they specify and enforce their access control policies in centralized servers. …”
Get full text
Article -
4
Aspect oriented approach to improvement role based access control systems
Published 2009“…As a case study, we present an aspect-oriented design framework for CORBA Access Control subsystem that supports different role-based access control models.…”
Get full text
Conference or Workshop Item -
5
Push-based XML access control policy languages: a review
Published 2014“…Several access control policy languages have been proposed for specifying access control policies for push-based XML access control systems. …”
Get full text
Conference or Workshop Item -
6
Secure role based access control systems using aspect-orientation designing
Published 2009“…Using role-based access control (RBAC) as an example, currently it supports role hierarchy, static separation of duty relations, and dynamic separation of duty relations. …”
Get full text
Conference or Workshop Item -
7
A distributed push-based XML access control model for better scalability
Published 2008“…XML access control is a non-trivial topic as XML language becomes a standard for data representation and transmission on the Web. …”
Get full text
Conference or Workshop Item -
8
Event correlation, extra information and merged policies approaches for integrating intrusion detection and access control systems.
Published 2013“…This survey investigates the connection between the intrusion detection and access control systems and then it reviews the existing approaches for integrating them. …”
Get full text
Article -
9
A compact bit string accessibility map for secure XML query processing
Published 2012“…One of the challenging issues related to specifying a fine-grained access control on the XML data is how to implement the accessibility map in a compact format with minimum affect on the XML query processing. …”
Get full text
Article -
10
A dynamic compressed accessibility map for secure XML querying and updating
Published 2015“…By specifying a fine-grained access control on the XML data, an accessibility map is required to determine the accessibility of XML nodes for a specific subject (e.g. user or role) under a specific action (e.g. read or write). …”
Get full text
Article