Showing 1 - 16 results of 16 for search '"access control"', query time: 0.09s Refine Results
  1. 1

    Access control in open distributed systems by Udzir, Nur Izura, Wood, Alan, Muda, Zaiton, Dehghantanha, Ali, Abdullah @ Selimun, Mohd Taufik, Abdullah, Azizol

    Published 2012
    “…In this paper, we discuss two conventional access control mechanisms-access control lists and capabilities-which can be incorporated in the Linda·model, and their suitability and implications on the flexibility of the model.…”
    Get full text
    Conference or Workshop Item
  2. 2

    Security extensible access control markup language policy integration based on role-based access control model in healthcare collaborative environments by Teo, Poh Kuang, Ibrahim, Hamidah, Udzir, Nur Izura, Sidi, Fatimah

    Published 2011
    “…Though eXtensible Access Control Markup Language (XACML) has a powerful capacity of expression, it does not support all the elements character of RBAC. …”
    Get full text
    Article
  3. 3

    Role performance trust-based access control for protecting sensitive attributes by Salji, Mohd Rafiz, Udzir, Nur Izura, Ninggal, Mohd Izuan Hafez, Mohd Sani, Nor Fazlida, Ibrahim, Hamidah

    Published 2016
    “…Preserving privacy is a challenge and requires the management of access control, which may be based on role, purpose or trust. …”
    Get full text
    Article
  4. 4

    Performance and divisional trust and purpose-based access control for privacy preservation by Salji, Mohd Rafiz, Udzir, Nur Izura, Hafez Ninggal, Mohd Izuan, Mohd Sani, Nor Fazlida, Ibrahim, Hamidah

    Published 2018
    “…To keep the privacy safe from inappropriate use, one of the most popular methods that can be used is the access control. Currently, many augmentation of access control models has been developed to improve the effectiveness in preserving the privacy. …”
    Get full text
    Article
  5. 5

    Trust, purpose, and role-based access control model for privacy protection by Salji, Mohd Rafiz, Udzir, Nur Izura, Ninggal, Mohd Izuan Hafez, Mohd Sani, Nor Fazlida, Ibrahim, Hamidah

    Published 2019
    “…Role-based access control model has been proposed to protect customer's data. …”
    Get full text
    Conference or Workshop Item
  6. 6

    Trust-based access control model with quantification method for protecting sensitive attributes by Salji, Mohd Rafiz, Udzir, Nur Izura, Hafez Ninggal, Mohd Izuan, Mohd Sani, Nor Fazlida, Ibrahim, Hamidah

    Published 2022
    “…Despite the recent advances in access control frameworks and models, there are still issues that hinder the implementation of successful access control. …”
    Article
  7. 7

    An empirical study of the characteristics of access control model towards secure KMS in collaborative environment by Abu Bakar, Azreena, Abdullah, Rusli, Udzir, Nur Izura, Ibrahim, Hamidah

    Published 2011
    “…Consequently, this paper formulates a model of collaborative KMS access control. The proposed model can be a guidance to study further the member of ACM family particularly the role based access control (RBAC) towards secure collaborative KMS.…”
    Get full text
    Conference or Workshop Item
  8. 8

    Blockchain-based access control scheme for secure shared personal health records over decentralised storage by Hussien, Hassan Mansur, Md Yasin, Sharifah, Udzir, Nur Izura, Ninggal, Mohd Izuan Hafez

    Published 2021
    “…The access control scheme is constructed on the basis of the new lightweight cryptographic concept named smart contract-based attribute-based searchable encryption (SC-ABSE). …”
    Article
  9. 9

    Implementing severity factor to mitigate malicious insider by Asmawi, Aziah, Affendey, Lilly Suriani, Udzir, Nur Izura, Mahmod, Ramlan

    Published 2019
    “…Many access control models and enforcement mechanisms have been proposed to prevent the unauthorized release of XML data. …”
    Get full text
    Article
  10. 10

    Policy inconsistency detection based on RBAC model in cross-organizational collaboration by Teo, Poh Kuang, Ibrahim, Hamidah, Sidi, Fatimah, Udzir, Nur Izura

    Published 2011
    “…A model to prune and collect only the required policies based on access control requirements from different organizations is designed. …”
    Get full text
    Conference or Workshop Item
  11. 11

    User-independent and self-optimizing intrusion detection framework for large database systems by Adinehnia, Reza, Udzir, Nur Izura, Affendey, Lilly Suriani, Ishak, Iskandar, Mohd Hanapi, Zurina

    Published 2014
    “…Despite various access control approaches, databases are still vulnerable to intruders who are able to bypass these protective methods and access data, or prevent insiders like authorized users who misuse their privilege. …”
    Article
  12. 12

    A compact bit string accessibility map for secure XML query processing by Mirabi, Meghdad, Ibrahim, Hamidah, Udzir, Nur Izura, Mamat, Ali

    Published 2012
    “…One of the challenging issues related to specifying a fine-grained access control on the XML data is how to implement the accessibility map in a compact format with minimum affect on the XML query processing. …”
    Get full text
    Article
  13. 13

    A hybrid face detection system using combination of appearance-based and feature-based methods by Tabatabaie, Zahra Sadri, O. K. Rahmat, Rahmita Wirza, Udzir, Nur Izura, Kheirkhah, Esmaeil

    Published 2009
    “…Human face detection is preliminary required step of face recognition systems as well as a very important task in many applications, such as security access control systems, video surveillance, human computer interface and image database management. …”
    Get full text
    Article
  14. 14

    An effective modality conflict model for identifying applicable policies during policy evaluation by Ibrahim, Hamidah, Teo, Poh Kuang, Udzir, Nur Izura, Sidi, Fatimah

    Published 2018
    “…Policy evaluation is a process to determine whether a request submitted by a user satisfies the access control policies defined by an organization. Modality conflict is one of the main issues in policy evaluation. …”
    Get full text
    Article
  15. 15

    An effective naming heterogeneity resolution for XACML policy evaluation in a distributed environment by Teo, Poh Kuang, Ibrahim, Hamidah, Sidi, Fatimah, Udzir, Nur Izura, Alwan, Ali Amer

    Published 2021
    “…Policy evaluation is a process to determine whether a request submitted by a user satisfies the access control policies defined by an organization. Naming heterogeneity between the attribute values of a request and a policy is common due to syntactic variations and terminological variations, particularly among organizations of a distributed environment. …”
    Article
  16. 16

    A dynamic compressed accessibility map for secure XML querying and updating by Mirabi, Meghdad, Ibrahim, Hamidah, Fathi, Leila, Udzir, Nur Izura, Mamat, Ali

    Published 2015
    “…By specifying a fine-grained access control on the XML data, an accessibility map is required to determine the accessibility of XML nodes for a specific subject (e.g. user or role) under a specific action (e.g. read or write). …”
    Get full text
    Article