Information Security Architecture-Context Aware Access Control Model for Educational Applications
|
|
|
- Anissa Jenkins
- 10 years ago
- Views:
Transcription
1 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.12, December Information Security Architecture-Context Aware Access Control Model for Educational Applications N.DuraiPandian*, V.Shanmughaneethi** & Dr.C.Chellappan*** *Research Scholar, Computer Science Dept.,Anna University, Chennai 25 **Lecturer, Computer Centre, NITTTR, Taramani, Chennai, India ***Professor, Computer Science Dept., Anna University, Chennai 25, India Abstract: Information is an asset for every organization. The constantly increasing nature of computers systems on the functioning of organizations results in concerns about the threats to the information usage. Security requirements approached at the organization level initiate the need for models that capture the organizational and distributed aspects of information usage. Such models have to express organization specific security policies and internal controls aiming to protect information against unauthorized access and modification and against usage of information for unintended purposes. Existing systems follows Role Based Access Control models (RBAC) which are application dependent and whether they address the problems posed by mobile devices such as note books, Personal Digital Assistants (PDA), is an open question. What today s organization require is flexible, authentication on necessity, context aware access control and enforcement of dynamic authorization? In this paper we propose Context Aware Information Security Architecture to fulfill the organization s security needs. Keywords: Access Control, RBAC, Information Security, Dynamic Authorization, Context aware Systems, and Authentication 1. Introduction Many organizations are extending their operations to operate over internet. Education is also one such application. Almost every education system participants (e.g. colleges, Book stalls, Press, Insurance companies) have already implemented some type of computerized system to manage their operations. But they don t have any connectivity between themselves at all. A more integrated system will be a boon to the parents. Also it will be less costly for a parent to log into a common website to get the information of many colleges before admitting his ward into a college instead of getting into different web sites. A web services approach will do this but privacy and security of secret information should be ensured. To do this one should understand the security requirements of modern education system. First education system needs a variety of authentication mechanisms instead of traditional password mechanism. Biometric and non-biometric methods are to be used. A practical online education system must accommodate a variety of authentication mechanisms. Secondly, even within a single college, there can be lot of applications that require making complex access control decisions If a student wants to see the marks of another student he cannot see it unless he is given permission by the faculty who is handling the subject. Traditional RBAC allows authorization based on roles but that is not sufficient to enforce policies that are dependent on run time parameters. Current education
2 198 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.12, December 2006 applications require context aware information security architecture to enforce that. Third the security requirements of education system need a very dynamic, flexible policy enforcement which should also handle unexpected situations. In the proposed approach authorization permission is either granted or rejected dynamically with the aid of centralized access control policy. Changing context is inferred & corresponding access privileges are assigned automatically. Context parameters are location, time, role, authentication trust level, type of information accessed. Rest of paper is organized as follows. Section 2 discusses related works. Section 3 discusses the proposed context aware security Framework. Section 4 discusses the implementation of the proposed system. Section 5 discusses the proposed model with an application. Section 6 discusses conclusion. 2. Related works Mandatory Access Control (MAC) is discussed [12][13] by T. Martzahn and K.J.Biba and Discretionary Access Control is introduced in [11] by Sandhu and Samarati. RBAC was introduced by Sandhu [1] where components of RBAC were discussed. Here authorization is given by assigning permission to roles than users. Bertino et al.[2] discusses Temporal RBAC which introduces time into access control architecture. Location & system status is introduced by Covington et al.[3] as constraints. In access control decisions, involvement of subject roles, object roles & environmental roles is incorporated by Moyer & Abamed in generalized RBAC [4]. Activities in a team are used as contextual information by Georgiadis & Mavridis [5] & Wang [6] in Team based Access Control Model. Context Sensitive by Kumar et. Al [7] is not applicable in distributed scenarios. Some more research issues in context related security applications are discussed by Neumann & Strembed [8] and Lee et. Al. Applying RBAC model to applications distributed over internet is proposed by Taylor and Murty [9] & Joshi et Al [10] which discusses security model for authentication & access in distributed systems. But context is not integrated in this model. In the proposed architecture context parameters are included to extend the RBAC model. 3. Context Aware Information Security Architecture 3.1 Authentication: When a request is made to access information, first stage is always authentication. Biometric and non biometric Digital techniques are used. Each technique is assigned with a trust level decided by the perceived reliability of the technique or given by the organization by their experience with different mechanisms. Trust level of retina is denoted as T (Retina). Generally T (Retina) > T (Iris) > T (Finger Print) > T (Password). To access highly confidential information a high trust level is needed. In case user is logged on to the system with lesser trust level, he will be asked to re login and request with a required trust level.
3 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.12, December Client System Authentication Engine DB Policy Engine Authorisation Level 1 Context Engine Autjorisation Level 2 Trusted Third Party DB 3.2. Authorization Level 1 Education Systems have complex access rules since there are many actors in the system and their interlocking access privileges and most of the rules have to be context aware. An Educations system should support thousands of users, roles, objects and permissions. In this section context aware access control schema is introduced Terminology Used: Object: Smallest unit to be accessed and to be protected (ex.) Files Object Set: Set of all objects within an application User Set: Set of potential entities that can access objects in object set of an application (ex) Manager Context Type (CT): Property related to every participant in an application where it is running.(ex.) Time Context Set (CS): Set of Context Types (ex.) {Time, Location.}. Whenever Necessary, elements of context set can be added by administrators. Context Constraint (CC) It is expressed as a regular expression. CC: =Clause1 Ụ Clause 2 Ụ Clause i Clause: =Cond1 Cond2 Cond j Cond: = <CT> <OP> <VALUE> where CT Є CS, OP is a logical Operator from set {,,,, <,>}. we can have user defined operators also. VALUE is a specific value of CT Authorization Policy (AP): It is a Quadruple. AP = < UR, M. O, C> UR is user or role M is Mode of operation (Read, Delete, write and Update) O Object in question C Context Constraint Object Access (OA) It is also a quadruple. OA = < U, M.O, DC> U - User who made the request M Mode of Operation
4 200 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.12, December 2006 O Object DC- Dynamic Context Set of values for every context type in context set. Object access is granted only if there exists an authorization policy <UR, M. O, C> such that UR ЄS, M=M. O=O, C evaluates to be true under DC Algorithm: 1) Find Policy Set required for a request PSR = {} For every AP in policy set If (U in OA Є UR in AP) and (M in OA = M in AP) and (O in OA = O in AP) Put AP in PSR End if End For 2) ACCESS = Denied For every AP in PSR New = C; CL = TRUE; For every clause CL in New For every condition CN in CL Get new value of CT in CN Calculate CN with new value If (CN=FALSE) : CL=FALSE; Break ;} End if End For IF (CL=TRUE) then Continue; Else break; End For; If (CL=TRUE) ACCESS = Accept Else ACCESS = Denied 3) If (ACCESS = Accept ) and (Classification= Highly Confidential) Then use Ambient Calculus approach Ambient Calculus Approach If the user wants highly confidential information then ambient concept is used. Assume user-agent trying to gain access to an ambient. In this case, we assume that the ambient, a firewall, keeps its name completely secret, thereby requiring authentication prior to entry. The agent crosses the firewall by means of previously arranged keys k, k, k. The agent exhibits the key k by using a wrapper ambient that has k as its name. The firewall, which has a secret name w, sends out a pilot ambient k [out w. in k. in w], to guide the agent inside. The pilot ambient enters an agent by performing in k and is given control by being opened. Then, in w transports the agent inside the firewall, where the key wrapper is discarded. The third name, k is needed to confine the contents of Q of the agent to prevent q from interfering with the protocol. The final effect is that the agent crosses the firewall and retrieves the information Ambient Calculus Notation: Highly confidential information P is kept in an ambient w. w is represented as a firewall. Firewall (def) (vw) w [k [out w. in k. in w] open k. open k. P].The request is represented by an agent that have three public keys k, k, k and the request as process Q. Processes: P and Q Ambients: w, k, k and k Capabilities: in, out and open Restriction: (v) Firewall: Firewall (def) (vw) w [k [out w. in k. in w] open k. open k. P] Agent: Agent (def) k [open k. k [Q]] Agent and Firewall composition: Agent Firewall (vw) (k [open k. k [Q]] w[ k[out w. in k. in w ] open k. open k. P] * (vw) (k [open k. k [Q] k [in w]] w [open k. open k. P]) * (vw) (k [k [Q] in w] w [open k. open k. P]) * (vw) (w [k [k [Q]] open k. open k. P]) * (vw) (w [[k [Q] open k. P]) * (vw) (w [[Q P]) Here * represents reflexive transitive closure and (vw) represents the restriction on w.
5 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.12, December Implementation of Proposed Security Architecture Fig. 1 shows the necessary system architecture of the proposed architecture. Main Components of security architecture are 1) Authentication Engine 2) Authorization Engine 3) Classification Engine 4) Context Engine Authentication Engine is responsible for issuing authentication certificate with trust level embolden on it. Authorization Engine monitors all requests coming from web service interface. If requester has right to access information which is decided at run time then access is granted and information is sent to requester. Context Engine evaluates each type dynamically and returns the results to authorization engine. Classification Engine provides the current classification level of object being accessed to authorization Engine. 5. Prototype of the system: We discuss below an application Education System where the proposed architecture can be of more useful. Application Overview: The Education portal is the main access point of all users such as Professors, Students, and Administrative Staff etc. It provides information to common public and also provides dynamic function on web page for users based on their roles. For Example one user authenticated as a student can see his marks, assignment questions, test schedule etc. Also he can see the seminars being organized in the dept.,. When professor X logs in, all his classes, subject names are displayed. Selecting a particular one displays name of students enrolled, their previous semester Marks etc. This information will not be visible to others as they cannot authenticate themselves as Professor X. This is the first level of Security which is based on RBAC Model. Behind this layer we have our second layer called context layer. Only system administrators can go up to this level to see those pages which define access policies, context definitions. This layer implements our dynamic context aware access control infrastructure & all access control policies are written there. They define context types, specify conditions associated with particular permissions based on context definitions. This supports access control requirements that we need for education systems. One such requirement is a student can see his own marks but not other students. The administrator defines a context type isowner(uid,oid) which evaluates target object to determine if it is owned by target user and returns the Boolean value. To update student marks a professor should be the one who is handling the subject and he should be authenticated at a trust level of fingerprint or higher. This can be written as IsSubTaker(Uid,Sid) and AuthLevel(Uid)>=T(Fingerprint). Performance Evaluation: Let us see how the above architecture works in the following scenarios. Following are some of the filenames available in the system. {Colleges, Project, Career, Intercom numbers, Marks} Object Type {Public, Confidential, Internal Use only, Highly Confidential} Public: {Colleges, career} Internal Use only={intercom numbers} Confidential = { Marks..} Highly Confidential = {Project, Feedback about students}
6 202 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.12, December 2006 Roles = { Management, Faculty, Student, Admin Staff, Public, Parents} Users in Management =( Kumar, Vasu} Faculty = ( Kavitha, Kumaran.} Students = { Eswar, James.} Adminstaff={ Shanthi, Kala.} Public = { Guest,.} Parents = { Raman, Veean.} Context Type = {Location, Time, Trust Level, Classification, Ismember(Project) IsOwner(User,Object)..} Location = {Secure, Public} Time = {all time, office hours, non office hours} Trust Level = {Password, Thumb, retina } Classification = {Public, Confidential, Internal Use only, Highly Confidential} Action= {Low, Medium, High} Low= {Read} Medium= {Append, write} High={delete} Condition = <CT> <OP><VALUE> Access Policy: AP01:<Public, Read, Help, Location= public Time=alltime> AP02:<Management, Read, Confidential, Location= Secure Time = Office Hours IsOwner(User,Project) Classifcation= Confidential AP03:<Student, Read, Marks, Location =Public Classification=Public> and we have so many other policies. Scenario 1: Guest requesting for college general information at 5.00 pm from a internet café Req. info.: College = Public Role = Public Time = alltime Location=Public By our algorithm Rule AP01 will be selected. There Condition is Location= public Time=alltime Location= public 1 Time=alltime 1 1 1=1 So information will be given. Scenario 2: Kumar wants to see his project from internet café by 10.00a.m Kumar is in management role. So AP02 will be selected. Conditions there is Location= Secure Time = Office Hours IsOwner(User,Project) Classifcation= HighlyConfidential Location = Public 0 Time = Officehours 1 IsOwner(Kumar,Project) 1 Classification = HighluConfidential 1 === So he will not be given the access. Though he is having all rights but since he is trying to access the information from a public place, he is not authorized to see the information. Likewise many cases are testes and found to be context aware. We have used XML for writing the policesbecause XML is the standard representation for interoperation rules between different applications.. 6. Conclusion In this paper we described a context aware information security architecture that extends the traditional RBAC model to gain more advantages because of the context property. Our research motivation comes from the complicated access control requirement of current education system,. Traditional RBAC model is static with poor flexibility and extensibility. Our new security infrastructure is dynamic and with following advantages. Our proposed model takes authorization decisions based on context information in addition to roles. It can be applied dynamically. The proposed security infrastructure is flexible and allows easy extensibility. References
7 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.12, December [1] Ravi S Sandhu, Edward J.Coyne, Hal L Feinstein, Charles E.Youman, Role Based Access Control, IEEE Computer, Volume 2, Feb. 1996, pp [2] Elisa Bertino Piero Andrea Bonatte & Elena Ferrari, TRBAC: A Temporal Role Based Access Control Model,ACM Transactions on Information & System Security, Volume 4, No. 3, August 2001, pp [3] Michael J Covington, Wende Long & Srividhya Srinivasan, Secure Context Aware Applications using Environmental Roles, Proceedings of sixth ACM Symposium on Access Control Models and Technologies, Msy 2001, Virginia, USA [4] M.J.Moyer & M Ahamed, Generalised Role Based Access Control:, 21 st International Conference on Distributed Computing Systems, April 16-19, 2001, Atlanta, USA [5] Christos K. Georgiadis, George Pangalos, Ioannus Marvidis Rashan K. Thomas, Flexible Team Based Access Controls using Contexts, Proceedings of sixth ACM Symposium on Access Control Models and Technologies, May 2001, Virginia, USA [6]Weigang Wang. Team & Role Based Organization Context and Access Control for Co-Operative Hypermedia Environments, Proceedings of tenth ACM Conference on Hypertext & Hypermedia, Feb. 1999, Germany [7] ArunKumar, Neeran Karnik & Girish Chafle, Context Sensitivity in RBAC, ACM SIGOPS Operating Systems Review, Volume 36, Issue 3, July 2002 [8] Gustaf Neuman & Mark Strembeck, An approach to Engineer & Enforce Context Constraints in an RBAC Environment:, Proceedings of Eighth ACM Symposium on Access Control Models and Technologies, June 2003, Italy. [9] Kerry Taylor, James Murty, Implementing RBAC for Federated Information Systems on the Web, Proceedings of the Australassian Information Security Workshop, January 2003, Adelaide, Australia. [10] James B.D.Joshi, Walid G.Aref, Arif Gnafor & Eugene H.Spafford. Security Models for Web Based Applications, Communications of ACM, Volume 44, No.2, February 2001, pp [11] R.S.Sandhu, P.Samarati, Access Control: Principles & practice, IEEE communications 32(9), page 40-48, 1994 [12] K.J.Biba, Integrity Constraints for secure computer systems, EST TR , ESD/AFSC, Hanscom AFB, Bedford, MA, April 1977 [13] T. Martzahn, Implementing the Just Enough Privilege security model, SANSInstitute,Information security room, About the Authors: Dr.C.Chellappan received his Master of Engineering Degree in Computer Science & Engineering and Ph.D. Degree in the area of Data Base Technology in the year 1987 from Anna University, Chennai, Tamil Nadu, India. He is currently working as Professor, Department of Computer Science and Engineering, Anna University. His Research interests include Computer Networks, Mobile Computing, and Network Security. He is guiding many Research Scholars in these areas from M.S. and Ph.D. programme. He has published many Research papers at National and International level Conferences and Journals.
8 204 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.12, December 2006 Mr.N.DuraiPandian received his Bachelor of Engineering Degree in Electronics and Communication Engineering in 1989 and Master of Engineering Degree in Computer Science and Engineering in 1994 from Regional Engineering College, Trichy, TamilNadu, India. He is currently working as Professor, Department of Information Technology, Velammal Engineering College, Chennai, Tamil Nadu, India. His Research interests include Operating systems, Computer Networks, Network Security. Mr.V.Shanmughaneethi received his Bachelor of Engineering Degree in Computer Science and Engineering in 1996 from Shanmugha College of Engineering, TamilNadu and Master of Engineering Degree in Computer Science and Engineering in 2002 from Anna University, Chennai, TamilNadu, India. He is currently working as Lecturer, National Institute of Technical Teachers Training and Research (NITTTR), [Govt. Of India], Chennai, Tamilnadu His Research interests include Computer Networks, Network Security, and ICT in Education.
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
Extended RBAC Based Design and Implementation for a Secure Data Warehouse
Extended RBAC Based Design and Implementation for a Data Warehouse Dr. Bhavani Thuraisingham The University of Texas at Dallas [email protected] Srinivasan Iyer The University of Texas
Towards Securing APIs in Cloud Computing
Towards Securing APIs in Cloud Computing Kumar Gunjan #1, R. K. Tiwari *2, G. Sahoo #3 # Department of Information Technology, Birla Institute of Technology, Mesra Ranchi, India * RVS College of Engineering&
Welcome to Information Systems Security (503009)
Welcome to (503009) Nguyen Thi Ai Thao Faculty of Computer Science & Engineering HCMC University of Technology [email protected] Course Outline Week Lectures 1 Information systems security: basic
Collaboration Service Integration Platform Using Context-Aware Role-Based Access Model
, pp.126-131 http://dx.doi.org/10.14257/astl.2013.29.26 Collaboration Service Integration Platform Using Context-Aware Role-Based Access Model Shu-Ping Lu 1, Kuei-Kai Shao 1, Yu-Nung Chao 1, Kuo-Shu Luo
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on
Implementing XML-based Role and Schema Migration Scheme for Clouds
Implementing XML-based Role and Schema Migration Scheme for Clouds Gurleen Kaur 1, Sarbjeet Singh 2 Computer Science and Engineering, UIET Panjab University, Chandigarh, India 1 [email protected]
Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn
Best Practices, Procedures and Methods for Access Control Management Michael Haythorn July 13, 2013 Table of Contents Abstract... 2 What is Access?... 3 Access Control... 3 Identification... 3 Authentication...
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering Sixth Semester Subject: Network Security & Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents
Role-Based Access Control Requirements Model with Purpose Extension
Role-Based Access Control Requirements Model with Purpose Extension Faranak Farzad 1, Eric Yu Faculty of Information Studies University of Toronto, Canada Patrick C. K. Hung Faculty of Business and Information
CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS
CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS Shilpa G S 1, Maria Navin J R 2 1 PG Student, Dept. of Computer Science and Engineering, SVCE Bangalore,
CONCEPTUAL FRAMEWORK FOR GEOSPATIAL DATA SECURITY
CONCEPTUAL FRAMEWORK FOR GEOSPATIAL DATA SECURITY Sangita Zope- Chaudhari 1 and P. Venkatachalam 2 1 Research Scholar, Centre of Studies in Resources Engineering, Indian Institute of Technology Bombay,
Establishing a valuable method of packet capture and packet analyzer tools in firewall
International Journal of Research Studies in Computing 2012 April, Volume 1 Number 1, 11-20 Establishing a valuable method of packet capture and packet analyzer tools in firewall Kumar, P. Senthil Nandha
A Semantic Approach for Access Control in Web Services
A Semantic Approach for Access Control in Web Services M. I. Yagüe, J. Mª Troya Computer Science Department, University of Málaga, Málaga, Spain {yague, troya}@lcc.uma.es Abstract One of the most important
Role-based Authorization Constraints Specification Using Object Constraint Language
Role-based Authorization Constraints Specification Using Object Constraint Language Gail-Joon Ahn Department of Computer Science University of North Carolina at Charlotte [email protected] Michael. E. Shin
Integrating basic Access Control Models for efficient security along with encryption for the ERP System
Integrating basic Access Control Models for efficient security along with encryption for the ERP System Prof. Swapnaja A. Ubale Research Scholar (Computer Science & Engineering Department) Research Center
Accessing Private Network via Firewall Based On Preset Threshold Value
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Context-Aware Role Based Access Control Using User Relationship
International Journal of Computer Theory and Engineering, Vol. 5, No. 3, June 2013 Context-Aware Role Based Access Control Using User Relationship Kangsoo Jung and Seog Park We suggest relationship-based
Security Issues for the Semantic Web
Security Issues for the Semantic Web Dr. Bhavani Thuraisingham Program Director Data and Applications Security The National Science Foundation Arlington, VA On leave from The MITRE Corporation Bedford,
User Authentication Platform using Provisioning in Cloud Computing Environment
User Authentication Platform using Provisioning in Cloud Computing Environment Hyosik Ahn, Hyokyung Chang, Changbok Jang, Euiin Choi Dept. Of Computer Engineering, Hannam University, Daejeon, Korea {hsahn,
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY Asst.Prof. S.N.Wandre Computer Engg. Dept. SIT,Lonavala University of Pune, [email protected] Gitanjali Dabhade Monika Ghodake Gayatri
1. Introduction. 2. Background. 2.1. Cloud computing in a nutshell
Title: Towards new access control models for Cloud computing systems Category: 'In the Cloud' - Security Author name: Gouglidis Antonios City, Country: Thessaloniki, Greece Year of study, Course Title:
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments Abhishek Majumder, Suyel Namasudra and Samir Nath Abstract Cloud computing is an emerging and highly attractive technology
Security Implications of Distributed Database Management System Models
Security Implications of Distributed Database Management System Models 1 * Dr.C.Sunil Kumar, 2 J.Seetha, 3 S.R.Vinotha 1,2,3 Anna University, Chennai, India E-mail: 1 [email protected], 2 [email protected],
DESIGN AND IMPLEMENTATION OF AN INTRANET SECURITY AND ACCESS CONTROL SYSTEM IN UBI-COM
Computing and Informatics, Vol. 30, 2011, 419 428 DESIGN AND IMPLEMENTATION OF AN INTRANET SECURITY AND ACCESS CONTROL SYSTEM IN UBI-COM Malrey Lee Center for Advanced Image and Information Technology
Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication
RESEARCH ARTICLE OPEN ACCESS Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication Siva Ramakrishnan S( M.Tech ) 1,Vinoth Kumar P (M.E) 2 1 ( Department Of Computer Science Engineering,
CS 464/564 Networked Systems Security SYLLABUS
CS 464/564 Networked Systems Security SYLLABUS College: College of Science Department: Department of Computer Science Syllabus Title: CS 464/564 Networked Systems Security Call Number: 1. Meet the Professor
Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Smart Open Services for European Patients Open ehealth initiative for a European large scale pilot of patient summary and electronic prescription
Smart Open Services for European Patients Open ehealth initiative for a European large scale pilot of patient summary and electronic prescription Deliverable: Work Package Document WP3.7 D.3.7.2. FINAL
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
CHAPTER 22 Database Security Integration Using Role-Based Access Control
CHAPTER 22 Database Security Integration Using Role-Based Access Control Sylvia Osborn Department of Computer Science, The University of Western Ontario London, Ontario, Canada, N6A-5B7 [email protected]
WiNG5 CAPTIVE PORTAL DESIGN GUIDE
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated
The Sensitive Information Management System for Merger and Acquisition (M&A) Transactions
, pp.203-212 http://dx.doi.org/10.14257/ijmue.2014.9.3.19 The Sensitive Information Management System for Merger and Acquisition (M&A) Transactions Kyong-jin Kim * and Seng-phil Hong ** Sungshin Women
A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services
, pp.21-30 http://dx.doi.org/10.14257/ijsia.2013.7.6.03 A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services Changsoo Lee 1, Daewon Jung 2 and Keunwang Lee 3 1 Dept.
An Effective Analysis of Weblog Files to improve Website Performance
An Effective Analysis of Weblog Files to improve Website Performance 1 T.Revathi, 2 M.Praveen Kumar, 3 R.Ravindra Babu, 4 Md.Khaleelur Rahaman, 5 B.Aditya Reddy Department of Information Technology, KL
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
Adi Armoni Tel-Aviv University, Israel. Abstract
Informing Science Data Security Volume 5 No 1, 2002 Data Security Management in Distributed Computer Systems Adi Armoni Tel-Aviv University, Israel [email protected] Abstract This research deals with
Challenges of Online Exam, Performances and problems for Online University Exam
www.ijcsi.org 439 Challenges of Online Exam, Performances and problems for Online University Exam Mohammad A Sarrayrih 1, Mohammed Ilyas 2 1 Information System and Technology Department, Sur University
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Access Control Models Part I. Murat Kantarcioglu UT Dallas
UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control Models Part I Murat Kantarcioglu UT Dallas Introduction Two main categories: Discretionary Access Control Models (DAC) Definition:
DATA MINING ANALYSIS TO DRAW UP DATA SETS BASED ON AGGREGATIONS
DATA MINING ANALYSIS TO DRAW UP DATA SETS BASED ON AGGREGATIONS Paparao Golusu 1, Nagul Shaik 2 1 M. Tech Scholar (CSE), Nalanda Institute of Tech, (NIT), Siddharth Nagar, Guntur, A.P, (India) 2 Assistant
Proof of Retrivability: A Third Party Auditor Using Cloud Computing
Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U 1, Madonna Arieth R 2, Geethanjali K 3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry
IPMS: A Web Portal for Industry Project Team Management
IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.4, April 2007 111 IPMS: A Web Portal for Industry Project Team Management Hao Shi School of Computer Science and Mathematics
86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014
86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 Dual server-based secure data-storage system for cloud storage Woong Go ISAA Lab, Department of Information Security Engineering,
Application Based Access Control on Cloud Networks for Data Security
Application Based Access Control on Cloud Networks for Data Security Ms. Smitha P M.Tech in DCN, Department of ECE GSSSIETW, Mysuru Karnataka, India Smitha.21sn @gmail.com Mrs. Manjula G Associate. Proffesor,
Information Security and Cryptography
Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland Lecturers: David Basin, ETH Zurich Ueli Maurer, ETH Zurich ATG www.infsec.ch Program Starting 09:00
How To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.
Access Control Intro, DAC and MAC. System Security
Access Control Intro, DAC and MAC System Security System Security It is concerned with regulating how entities use resources in a system It consists of two main phases: Authentication: uniquely identifying
Workflow Access Control from a Business Perspective
Workflow Access Control from a Business Perspective Dulce Domingos, António Rito-Silva 2, Pedro Veiga Informatics Department, University of Lisbon, Faculty of Sciences {dulce, pmv}@di.fc.ul.pt 2 INESC-ID
Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive
Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Profile Based Personalized Web Search and Download Blocker
Profile Based Personalized Web Search and Download Blocker 1 K.Sheeba, 2 G.Kalaiarasi Dhanalakshmi Srinivasan College of Engineering and Technology, Mamallapuram, Chennai, Tamil nadu, India Email: 1 [email protected],
SERVICE ORIENTED EVENT ASSESSMENT CLOSING THE GAP OF COMPLIANCE MANAGEMENT
IBM Software Group SERVICE ORIENTED EVENT ASSESSMENT CLOSING THE GAP OF COMPLIANCE MANAGEMENT Dieter Riexinger IT Architect 09.10.2009 2009 IBM Corporation Agenda Introduction Legal obligations and regulations
Software Requirements Specification. Schlumberger Scheduling Assistant. for. Version 0.2. Prepared by Design Team A. Rice University COMP410/539
Software Requirements Specification for Schlumberger Scheduling Assistant Page 1 Software Requirements Specification for Schlumberger Scheduling Assistant Version 0.2 Prepared by Design Team A Rice University
Ranked Keyword Search Using RSE over Outsourced Cloud Data
Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
Access Control of Cloud Service Based on UCON
Access Control of Cloud Service Based on UCON Chen Danwei, Huang Xiuli, and Ren Xunyi Nanjing University of posts & Telecommunications, New Model Street No.66, 210003, Nanjing, China [email protected],
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 Introduction Cloud computing as a new paradigm of information technology that offers tremendous advantages in economic aspects such as reduced time to market, flexible computing
Security Enhanced Linux and the Path Forward
Security Enhanced Linux and the Path Forward April 2006 Justin Nemmers Engineer, Red Hat Agenda System security in an insecure world Red Hat Enterprise Linux Security Features An overview of Discretionary
Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
ITM661 Database Systems. Database Security and Administration
ITM661 Database Systems Database Security and Administration Outline Introduction to Database Security Issues Types of Security Threats to databases Database Security and DBA Access Protection, User Accounts,
Monitoring Database Management System (DBMS) Activity for Detecting Data Exfiltration by Insiders
CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS Monitoring Database Management System (DBMS) Activity for Detecting Data Exfiltration by Insiders Northrop Grumman Information Systems Donald Steiner,
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Atif Ahmad & Anthonie Ruighaver University of Melbourne, Australia Abstract The design and implementation
Enhanced Model of SQL Injection Detecting and Prevention
Enhanced Model of SQL Injection Detecting and Prevention Srinivas Baggam, Assistant Professor, Department of Computer Science and Engineering, MVGR College of Engineering, Vizianagaram, India. [email protected]
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT Chandramohan Muniraman, University of Houston-Victoria, [email protected] Meledath Damodaran, University of Houston-Victoria, [email protected]
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala
Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud
Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud R.Udhayakumar 1, M. Jawahar 2, I.Ramasamy 3 PG Student, Dept. Of CSE,KSR Institute For Engineering
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
Web Services: Role Based Access Control with Single Sign-on Architecture
Rochester Institute of Technology Department of Computer Science M.S. Computer Science Project Proposal Web Services: Role Based Access Control with Single Sign-on Architecture Yevgeniy Gershteyn [email protected]
How To Secure Wireless Networks
Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements
Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus
Department of Computer & Information Sciences INFO-450: Information Systems Security Syllabus Course Description This course provides a deep and comprehensive study of the security principles and practices
Fahad H.Alshammari, Rami Alnaqeib, M.A.Zaidan, Ali K.Hmood, B.B.Zaidan, A.A.Zaidan
WWW.JOURNALOFCOMPUTING.ORG 85 New Quantitative Study for Dissertations Repository System Fahad H.Alshammari, Rami Alnaqeib, M.A.Zaidan, Ali K.Hmood, B.B.Zaidan, A.A.Zaidan Abstract In the age of technology,
Components- Based Access Control Architecture
Issue s in Informing Science and Information Technology Volume 6, 2009 Components- Based Access Control Architecture Adesina S. Sodiya and Adebukola S. Onashoga Department of Computer Science, University
