The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cooperation and sharing of resources are needed urgently between domains in pervasive computing environment, so building an effective cross-domain authorization model become a key issue. The IRBAC 2000 model accomplish flexibly interoperation by dynamic inter-domain role mapping, but how to manage the associations is not discussed, which may cause security problems. Algorithms to detect these security...
Especially within grid infrastructures driven by high-performance computing (HPC), collaborative online visualization and steering (COVS) has become an important technique to dynamically steer the parameters of a parallel simulation or to just share the outcome of simulations via visualizations with geographically dispersed collaborators. In earlier work, we have presented a COVS framework reference...
In order to overcome the limitations in traditional access control models such as identity-based access control and meet the access requirements in distributed systems, we propose a Trust and Context based Access Control model called TCAC, it extends the traditional RBAC (role based access control) model with the notion of trust and context. Role assignment in TCAC is based on the trustworthiness...
Role Based Access Control (RBAC) is arguably the most common access control mechanism today due to its applicability at various levels of authorization in a system. Time varying nature of access control in RBAC administered systems is often implemented through Temporal-RBAC - an extension of RBAC in the temporal domain. In this paper, we propose an initial approach towards verification of security...
Although RBAC models have received broad support as a generalized approach to access control, the administration of roles in large organizations can become quite cumbersome. In this paper, we develop a new paradigm for access control and authorization management, called task-role based access control (TRBAC) with multi-constraint. The basic idea of this model different from traditional RBAC is that...
Peer-to-peer file-sharing networks depend on peers uploading data to each other. Some peers, called free-riders, will not upload data unless there is an incentive to do so. Algorithms designed to prevent free-riding typically assume that connectivity is not a problem. However, on the Internet, a large fraction of the peers resides behind a firewall or NAT, making them unable to accept incoming connections...
Role-based access control (RBAC) models are a powerful tool for describing and managing authorization, particularly, in large organizations. The benefits of using formal methods to describe RBAC models in a clear, consistent and rigorous manner have been recognized. Notable exemplars, that have been formulated in the formal specification notation Z, include NIST's reference RBAC model and the minimalist...
This paper suggests an access control method based on organization-task, its formal description and implementation for OAS. This model implements access control dynamically from an organization-task oriented perspective than the traditional user or role oriented one. It is required for organization-based distributed computing and workflow management.
RBAC is powerful access control model which can be configured to enforce various traditional access control policies. Configurations of RBAC for enforcement of various mandatory and discretionary access policies are presented in the literature. However, many of these configurations are flawed. We observed that the errors are mainly due to the lack of a formal definition of correctness of configuration...
Inherited the flexibility merit of the access control model based on attribute(ABAC), the authorization model based on attribute delegation in grid (GADAM) is put forward, which Expressed the attribute set with attribute expression in this model, and adopted the method based on attribute delegation directly to assign and transmit the permission. Complied with the constraint mechanism of atomic authorization...
Role based access control (RBAC) model provides a means of efficient management of access control policy in large scale and widely distributed environment. With policy-neutral architecture and flexible constraints, RBAC can be configured to enforce various access control policies. However many access control policies cannot be configured with standard RBAC model. The framework of context active RBAC...
The trust mechanism is researched more in existing P2P literatures, but the access control strategy about information confidentiality in P2P network is discussed less. In this regard, the classifications grade, and the reputation grade, of the subject and of the object are introduced, and the ideas of existing access control strategy and BLP model are used in the paper. A P2P information security...
Nowadays, most of access control models have been studied extensively in centralized and static environment, and they seldom meet the requirements of some dynamic collaborative environments, such as Grid, P2P and ad-hoc network. In this paper, the trust mechanism of the agents in collaborative environments is analyzed, a suitable method is introduced for calculating the agentpsilas trust in collaborative...
RBAC realizes the separation of duty and helps to manage the users with various roles. However, RBAC cannot work well in distributed environment. In this paper, a flexible role- and resource- based access control model (called RRBAC) is proposed. RRBAC introduces role and resource concepts to access control, and provides a flexible approach for many security domains. RRBAC supports different types...
Due to the nowadays increasing applications of grid computing technology, the risks of grid security are growing, such as the problem of access control inter-domain in grid environment. Recently, trust management is considered as an effective approach for enhancing grid security. As the fuzzy feature of trust and the advantage of fuzzy theory for trust representation and reasoning, this paper presents...
Executable code not effectively inspected and authorized before its execution has been one of the key reasons for wild spread of malicious codes. This paper proposes a program file authorization model based on an integrity measurement and access control combined methodology. It measures integrity signature of each program file and verifies it with the its original value before its execution. By allowing...
The seamless combining with context-aware sensors and numerous devices and e-home server will soon become a part of our home environment in the near future. We name it as a context-aware home based on ubiquitous computing concept. This context-aware home reduces participations of users in order to realize a ubiquitous computing and automates various services. Therefore, the risk of privacy violation...
This paper proposes a context-aware security service providing multiple authentications and authorization from a security level which is decided dynamically in a context-aware environment. It helps developers build secure services efficiently. A security service in a dynamic environment uses multi-attribute utility theory and extended generalized role-based access control. The system uses attribute...
New important emerging business paradigms, such as ldquoservice virtualizationrdquo can be made easy and convenient by the use of P2P systems. In these paradigms, often the owners of the services are different (and independent) from the owners of the resources used to offer such services. In comparison to centralized servers, P2P systems can conveniently offer higher availability and more bandwidth...
Recently increased use of network-enabled devices in power systems, rapid development of distributed generations from renewable energy resources, and government-imposed open access competition have resulted utilities in greater reliance on computer networks for proper power grid operations. This paper proposes a new two-level architecture for power-grid computer networks and to strength the networks'...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.