The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Although federated cloud computing has emerged as a promising paradigm, autonomous orchestration of resource utilization within the federation is still required to be balanced on the basis of workload assignment at a given time. Such potential imbalance of workload allocation as well as resource utilization may lead to a negative cloudburst within the federation. The analytical models found in the...
In recent years, wireless sensor networks have been applied in many application areas. For some fields that have special timing requirement, only wireless sensor networks can not satisfy the needs of high speed communication. We propose a hybrid wired-cum-wireless sensor network by introducing the Contention-Collision Cancellation (C-CC) access control mode, which is an important access control mode...
Cloud file-sharing systems have become popular as a new issue for files exchanging. However, the free-riders of cloud computing environments make the task of controlling access to share information more difficult, which cannot be avoided by traditional access control methods. In this paper, resource sharing is essential circumstance for information diversty. It is important for the user to develop...
In the current information system which is highl dynamic, heterogeneous and distributed, it is necessary to realizing information-sharing and interoperation among multi-trust domains securely by a crossing single-domain restriction. This thesis analyses the basic idea of the IRBAC (Interoperability Role Based Access Control) 2000 model, then points out several existing problems in them, which are...
Since security has become an essential asset in numerous application areas, the integration of security policies has become a major issue in the design of security architectures, and many commodity operating systems have been furnished with abstractions to support policy protection and enforcement.
The complex security constraints in present day enterprise networks (wired or wireless LAN) demand formal analysis of security policy configurations deployed in the network. One of the needs of a network administrator is to evaluate network service accesses through appropriate queries. The security policy is represented as set of rules for allowing/denying various service accesses through the network...
When prosecuting crimes, the main question to answer is often who had a motive and the possibility to commit the crime. When investigating cyber crimes, the question of possibility is often hard to answer, as in a networked system almost any location can be accessed from almost anywhere. The most common tool to answer this question, analysis of log files, faces the problem that the amount of logged...
An access control model based on credibility is proposed. The Community Authorization Service (CAS) is an authentication technology which allows service providers to delegate some policy authority to the virtual organization. While in open distributed systems, provider join or leave the domain frequently, so access-control policy in the server changes quickly. To reduce the server load, threshold...
This paper presents an abstract model for Dynamic Access Control Architectures (DACAs). This model can express the most essential characteristics of a DACA, including risk, reputation and cost aspects, and how they interrelate. Such a model is helpful for designing and implementing a DACA, since it provides the flexibility to express several complex characteristics abstractly, ultimately resulting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.