The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Role-based access control (RBAC) model is the most widely used access control model in software, but for today's software are becoming more and more mobility, intelligent, distributed and complexity features, RBAC model show its low capability in formalize environment, context factors. To solve the issues above, this paper proposed a Multidimensional Space Access Control (MDSAC) Model, which puts...
Aiming at the lack of adequate and flexible access control in 3D virtual environment when used in education, according to RBAC model, we present an authority control method which can manage manipulations to all objects, e.g. a variety of assets, avatars, scripts and network communication pipes in 3D virtual environment. The proposed technique overcomes the insufficiency on access control aspect in...
The Access Policy Tool (APT) analyzes the firewall configuration in an enterprise network for compliance with a global access policy, such as one that describes the industry's best practices. APT is the culmination of several years of academic research and development; in this last year, we have been working with industrial partners in the energy sector to validate the results of the tool. More importantly,...
The contemporary Web is heading towards its next stage of evolution. From a clump of unorganized information spaces, the Web is becoming more focused on the meaning of information that is a Semantic Web. Trust is an integral component in semantic web, allowing people to act under uncertainty and with the risk of negative consequences. In this paper we discussed trust management and its connection...
Access control mechanisms control which subjects (such as users or processes) have access to which resources. To facilitate managing access control, policy authors increasingly write access control policies in XACML. Access control policies written in XACML could be amenable to multiple-duty-related security leakage, which grants unauthorized access to a user when the user takes multiple duties (e...
The components of different platforms usually need their proprietary testing languages to execute test cases. Thus it is essential to propose XML API-based test framework, which builds on standard component and supports different languages test on cross platforms. This study developed a general component extension test Interface (CETI) consisted of 4 kinds of function ports. Then on the basis of the...
Recent years have seen active development of context-aware applications and systems that helps the development. However, it suffers from increasing fears for leakages of userspsila activity information to other users unconsciously, since the owner of the activity information included in the sensor data is not treated in context-aware systems. We propose the area-based activity information preservation...
With advances of digital technology two or more organizations form a federation for a temporary purpose. It is possible that an employee of an organization needs to access resource of another organization. While languages like XACML are very good for access control of a single organization, they are not able to address interoperability issues of such federations. Lack of interoperability of access...
This is an introduction to the proceedings of the MWS 2007 workshop held at EDOC 2007. It first explains the motivation for and background of the workshop. Then, it contains a short description of the keynote, each long and short peer-reviewed paper, and the discussion session "impact of various execution environments on middleware for web services". After the closing statements, MWS 2007...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.