The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When we study on the research teaching through implementation of network teaching platform we found the absence of learning effect on the feedback. In order to solve the problem, this paper design and implementation of a research network teaching platform based on intelligent evaluation of learning outcomes (RBLMS). This platform could provide basis for decision making for teachers when they implement...
As applications requiring access control and the environments in which they operate in become more complex, an acute need for better ways to manage access control rules has arisen. Decentralized access control, for example, requires sophisticated techniques for conflict detection and for managing rules across multiple applications with different rule formats. XACML is an OASIS standard whose interoperability...
To protect the security and privacy of sensitive digital information, it is often necessary to employ a variety of security mechanisms such as encryption, integrity control, authentication, and access control. This paper describes a framework that extends eXtensible Access Control Markup Language (XACML) for use as a container for embedding access control policy with the digital content in the same...
Hierarchical cryptographic key management of access control can be modeled as a partially ordered set in which a high security class can derive its descendant encryption keys, but not vice versa. In this paper, we propose a practical key management scheme for our segment-based document which is a novel XML-based document format for web publishing, called CEBX. The proposed scheme is not only efficient...
Multi-policy supporting is a security mechanism which can control security system's action based on more than one policy. This mechanism can enhance the security of system greatly. The exiting typical access control1 models, such as MAC, DAC, RBAC, are not multi-policy supporting. This paper provides a multi-policy supporting access control model (MPSAC). Because of the complexity of applying multiple...
Trust-based access is an established technique in many fields, such as networks and distributed systems, but has not previously been used for XML (Extensible Markup Language) databases. In trust-based access control, user privileges are calculated dynamically depending on the user's trust value. Applying the technique to XML databases should have many advantages over current techniques, such as role-based...
In this paper, we ask whether XML access control can be supported when underlying (XML or relational) storage system does not provide adequate security features and propose three alternative solutions —primitive, pre-processing, and post-processing. Toward that scenario, in particular, we advocate a scalable and effective pre-processing approach, called QFilter. QFilter is based on non-deterministic...
Policy specification is a difficulty in policy-based management recently. This paper analyzes the common policy specification approaches and summarizes the definition of policy in the references. Then, we propose the concept of policy primitive language by defining that policy is a set of policy elements. Meanwhile, formalizing policy and policy primitive language, we prove the applicability of specifying...
After the few years' development, the informatization construction of water has made great achievements. With the expansion of business application in-depth, it exposed some After the few years' development, the informatization construction of water has made great achievements. With the expansion of business application in-depth, it exposed some problems such as system single-function, single application...
The emergence of XML-based web services as a new software development paradigm increases the expectations of getting better software that address the various collaboration demands over Internet between organizations, or what's termed virtual Organization (VO). The development of appropriate identity management systems between these heterogeneous security domains will be the key enabler for such collaboration...
The Semantic Web is gaining immense popularity-and with it, the Resource Description Framework (RDF)broadly used to model Semantic Web content. However, access control on RDF stores used for single machines has been seldom discussed in the literature. One significant obstacle to using RDF stores defined for single machines is their scalability. Cloud computers, on the other hand, have proven useful...
XML became the de facto standard for the data representation and exchange on the internet. Regarding XML documents access control policy definition, OASIS ratified the XACML standard. It is a declarative language allowing the specification of authorizations as rules. Furthermore, it is common to formally represent XML documents as labeled trees and to handle secure requests through “user views”. A...
Privacy in the digital world is a critical problem which is becoming even more imperious with the growth of the Internet, accompanied by the proliferation of e-services (e.g. e-commerce, e-health). One research track for efficient privacy management is to make use of user's and service provider's (SP) privacy policies, and to perform an automatic comparison in between to help any (skilled or unskilled)...
After reviewing the state of the security technology research and access control in the Web services environment, this paper presents a dynamic role-based access control (UE-DRBAC) model through user life cycle events and a secure architecture model for Web services. A reasonable access control is used to achieve the dynamic authorization by analyzing the relationship among roles based on user life...
A widely adopted security mechanism is the specification of access control policies by means of the XACML language. In this paper, we propose a framework, called X-CREATE, for the systematic generation of test inputs (XACML requests). Differently from existing tools, XCREATE exploits the XACML Context Schema. In particular, the tool applies a XML-based methodology (XPT) to systematically produce a...
In the modern health services era, data is accessed by the doctors and nurses using small handheld devices like mobile, Personal Digital Assistants and other electronic handheld devices. Individual's health related information is normally stored in a central health repository. This data can be accessed by authorized doctors. Data is prone to be exposed to a number of mobile attacks while being accessed...
As Internet enhancing its distributed computing characters, Web Services have gained great development and multi-domain environment application becomes more and more popular. But across different domains, the traditional RBAC model is facing some troublesome questions, such as user-role assignment and mapping difficulty. Web Services access control model based on attributes in multi-domain environment...
As demands for treating an access control on the client side, which is conventionally controlled by a server, increase, there is a need to treat query processing effectively and securely in an environment with limited resources. Access control that has been previously performed only focused on safety, and thus not much effort has been done to consider access control in terms of efficiency. This paper...
Attribute relations in access control mechanisms or languages allow accurate and efficient specification of some popular access control models. However, most of the access control systems including today's de-facto access control protocol and specification language, XACML, does not provide sufficient syntactic and semantic support for the specification of attribute relations in their scheme. In this...
Today's highly dynamic, distributed usage environments, need mechanisms to protect network resources against unauthorized access and unauthorized use. Current contributions in this area follow two main directions: a) users are known and thus service is granted on the basis of user's identifications, user's role, etc. b) users are unknown and thus service is granted on the basis of risk evaluation,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.