Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
XML databases are widely used in many different areas. They are multi user systems and can store a huge amount of data. Sensitive and important data need to be protected and stored securely. We have developed a dynamic trust based access control for XML databases to improve the security level and prevent malicious transactions from both internal and external users. Our system tracks user history of...
XACML is a powerful and flexible access control (AC) policy language. It is an OASIS standard that is now widely used in a variety of applications, particularly those that require inter-operability between AC systems. The language definition includes a precise grammar, syntax, and semantics, and it is both expressive and verbose. This combination of expressive power and verbosity can lead to difficulty...
Privacy of the data processed and/or stored in the cloud is a concern for the users of these services. Cloud platforms are exposed in the Internet, managed by third parties, and their usage is shared by different users. Identity and access control mechanisms are relevant because they intend to protect data from improper access. Among these mechanisms, identity federations let users' authentication...
Aiming at the lack of adequate and flexible access control in 3D virtual environment when used in education, according to RBAC model, we present an authority control method which can manage manipulations to all objects, e.g. a variety of assets, avatars, scripts and network communication pipes in 3D virtual environment. The proposed technique overcomes the insufficiency on access control aspect in...
When we study on the research teaching through implementation of network teaching platform we found the absence of learning effect on the feedback. In order to solve the problem, this paper design and implementation of a research network teaching platform based on intelligent evaluation of learning outcomes (RBLMS). This platform could provide basis for decision making for teachers when they implement...
Policy specification is a difficulty in policy-based management recently. This paper analyzes the common policy specification approaches and summarizes the definition of policy in the references. Then, we propose the concept of policy primitive language by defining that policy is a set of policy elements. Meanwhile, formalizing policy and policy primitive language, we prove the applicability of specifying...
Constraints are considered to be the principal motivation for RBAC model. XACML profile for RBAC can not meet the need of expressing static and dynamic RBAC constraints well. We give the XACML syntax of common static and dynamic Separation of Duty constraints and cardinality constraints of RBAC. We also complement Role Enablement Authority to extend this profile in order to enforce these constraints.
Information privacy is usually concerned with the confidentiality of personally identifiable information (PII), such as electronic medical records. Nowadays, Web services are used to support different applications which may contain PII, such as healthcare applications. Thus, the information access control mechanism for Web services must be embedded into privacy-enhancing technologies. Further as application...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.