A Survey on Administrative Policies in Rule- Based Access Control

Size: px
Start display at page:

Download "A Survey on Administrative Policies in Rule- Based Access Control"

Transcription

1 A Survey on Administrative Policies in Rule- Based Access Control Thirunavukkarasu S PG scholar, Maharaja Engineering College, Avinashi, India. [email protected] S.Umarani Assistant Professor, Maharaja Engineering College, Avinashi, India. [email protected] D.Sharmila Professor & Head, Bannari Amman Institute of Technology, Sathyamangalam, India. Abstract: Administrative controls contains the official written policies, rules, events and standards. It form the outline for running the organization and handling people. The Rule-Based access control defines detailed circumstances for access to a demanded object. It uses an elementary user-naming syntax, thus can interoperate with maximum certification methods. In the previous work tabling is used to compute the atoms derivable from the transformed policy which leads to abductive atom-reachability problem, there is no easing on use of wildcard and negation, there is only accumulation and removal of facts, not rules. Our projected work uses penetrating, talented state-space exploration, which covers over all static and dynamic information in all states. In this paper we compare the existing administrative polices in rule based access control methodologies with the proposed methodology. Keywords: Rule-Based Access Control, State-Space, Abductive, State-Space, Tabling I.INTRODUCTION The complex security policies needed by applications in large organizations are more brief and easier to administer when stated in higher-level policy languages. Recently, frameworks with rule-based policy languages, which deliver stretchy support for high level attribute-based policies, have attracted considerable attention. Rules based Access control is a strategy for managing user access to one or more systems, somewhere professional changes prompt the application rules, which specify access changes. In large administrations, access control policies are managed by numerous users (administrators). An administrative framework is used to express policies that require how each user may change the access control policy. For example, several administrative frameworks have been projected for role-based access control (RBAC) [1], starting with the classic ABAC97 model [2].Complete understanding the suggestions of an administrative policy in an enterprise system can be difficult, because of the rule and complexity of the access control policy and the administrative policy, and because arrangements of changes by different users may interact in unexpected ways. Administrative policy study supports by responding questions such as user-permission reachability, which asks whether identified users can together change the policy in a way that attains a stated goal, namely, granting a detailed permission to a specified user. Numerous analysis algorithms for user-permission reachability for ARBAC97 and alternatives thereof have been developed. There is work on administrative frameworks for rulebased access control and analysis algorithms for such frameworks [3], [4], [5], but it considers only addition and removal of facts, not rules. Analysis procedures for ARBAC also consider, in effect, only addition and removal of facts, not rules, because the administrative operations in ARBAC resemble to addition and removal of facts. In this Access Control and Administration using Rules (ACAR), a rule-based access control strategy language with a rule-based administrative framework that controls addition and exclusion of facts and rules. Access Control and Administration using Rules allows policies to be stated briefly and at a needed level of generalization. Nevertheless, fully accepting the implications of an administrative policy in ACAR might be more difficult, in some ways, than fully understanding the suggestions of an ARBAC policy, because in addition to considering communications between enclosed structures of changes by different administrators, one must also consider chains of implications using the facts and rules in each intermediate policy. In this a symbolic analysis algorithm for answering atom-reachability queries for ACAR policies i.e., for determining whether changes by specified ISSN : Vol. 5 No. 11 Nov

2 administrators can lead to a policy in which some instance of a specified atom (an atom is like a fact except that it may contain variables), called the goal, is derivable. To the best of our knowledge, this is the first analysis algorithm for a rule-based policy framework that considers changes to the rules in the policy as well as changes to the facts in the policy. Atom reachability can express a variety of stimulating properties, including user-permission reachability. The algorithm explains a policy analysis problem that involves changes to rules and facts into a problem that includes changes only to facts. This approach is considered to be a contribution of our work; we have not seen it in prior work. This approach can be modified to other settings, but not totally. In our setting, this approach works well because it is possible to pretend a rule granting permission to add rules using one rule granting authorization to add facts and one maintenance rule. This is an importance of the design of ACAR. With other administrative frameworks, play-acting calculation of rules using addition of facts might be difficult or ineffective. It is often required to be able to study rule-based policies with partial knowledge of the facts in the initial policy; for example, a database covering those facts might not exist yet, or it might be inaccessible to the policy engineer. Even if a database of facts exists and is existing, more general analysis results that hold under incomplete opportunities about the initial facts are often preferable to results that hold for only one given set of initial facts. For example, consider the policy that a clinician at a given hospital could treat a patient if he is a member of a hospital workgroup that is given to that patient. A policy examiner might want to analyze the rules in the hospital policy to compute all classifications of administrative actions that may allow a user to be a treating clinician for a patient, independent of data about specific patients, workgroups, etc. Even if such data exists and is available, it is transient, and the analysis is more thorough if it considers more general situations. There are two approaches to solve such an analysis problem. In the deductive approach, the user specifies constraints about the initial facts, and the analysis determines whether the goal is reachable under those constraints. However, expressing appropriate constraints might be difficult. The another way is an abductive approach, in which the analysis determines conditions on the set of facts in the initial policy under which the goal is reachable. More specifically, abductive analysis determines minimal set of atoms that, if present in the initial policy, imply reachability of the goal. This approach is inspired by Becker et al. s abductive policy analysis for rule-based policy languages [6], [7], and this algorithm builds on their tabling-based policy evaluation algorithm. Figure 1.1 RBAC/ABAC Hybrid II. RELATED WORKS A Logic for State-Modifying Authorization Policies The logic is semantically defined by a mapping to Transaction Logic, for specifying policies where access requests can have effects on the authorization state. State-Modifying Policies, a logic that not only expresses authorization conditions but also specify effects of access requests on the authorization state. The logic can be seen as a mild non-monotonic extension of Data log and has a formal semantics based on Transaction Logic It updates to the state are factored out of the resource guard, thus improving maintainability and facilitating more expressive policies. In this a sound and complete proof system for reasoning about sequences of access requests, which gives rise to a goal-oriented algorithm for finding minimal classifications that lead to a specified target authorization state. In this an inference system for reasoning about sequences of user activities, and a comprehensive and complete goal-oriented procedure for computing nominal sequences ISSN : Vol. 5 No. 11 Nov

3 Figure 2.1 Model of a policy-based authorization system Figure 2.2 Factoring out the state manipulations Expressive Policy Analysis with Enhanced System Dynamicity It is a logic-based policy analysis framework which satisfies, how many significant policy-related properties can be analyzed, and particulars of a prototype implementation. The framework was designed to meet the requirements like an analysis component using information about changing system state for accurate proof of significant properties, provide rich diagnostic information as output, separate the representation of system from policy, and include policies which depend on each other and contain fine-grained defaults. Abductive Constraint Logic Programming is an appropriate model for the kinds of analysis task that to perform on policies and also it is used to provide rich diagnostic information on the system traces and initial conditions which give rise to properties of policies in heterogeneous environments. The abduction is used to fill a partially-specified system, which gives rise to modality conflicts are generated as hypotheses. The broader objective is to define a refinement framework, an expressive abstract policy language is necessary both to represent a broad spectrum of high-level policies but also to accommodate different concrete mechanisms on which policies need to be implemented. Policy Analysis for Administrative Role Based Access Control Role-Based Access Control (RBAC) is collectively managed by many administrators. Administrative RBAC (ARBAC) models express the authority of administrators, so it specify how an organization s RBAC policy may change. Variations by one administrator may interact in accidental ways with changes by other administrators. Thus, the effect of an ARBAC policy is hard to understand by simple inspection. Main properties that are considered i.e., reachability properties, availability properties, containment properties satisfied by a policy, and information flow properties. A few combinations of syntactic restrictions under which safety analysis can be done in polynomial time are identified. More experience is needed to determine how often these restrictions are satisfied in practice. It step towards a deeper understanding of policy analysis for ARBAC. Figure 2.3 Role based access control ISSN : Vol. 5 No. 11 Nov

4 Specification and Analysis of Dynamic Authorisation Policies It is based on transaction logic, for specifying active authorization policies, i.e., rules leading actions that may depend on and update the authorization state. It has the feature of conditional bulk insertions and retractions of authorization facts, non-monotonic negation, and nested action definitions with transactional execution semantics. Two corresponding policy analysis methods are also presented, one based on Artificial Intelligence planning for verifying reachability properties in finite domains, and second is based on computerized theorem proving, for examination policy invariants that hold for all sequences of actions and in subjective, including infinite, domains. The combination of both methods, analyze a wide range of security properties, with safety, accessibility and containment. Abductive Analysis of Administrative Policies in Rule-Based Access Control Access control policies are managed by administrators. An administrative policy, which provides the details about how each user in an enterprise may change the policy. Due to scale and complexity of the access control policy and the administrative policy the understanding of an enterprise system is difficult. Administrative policy analysis helps by answering questions such as user-permission reachability that achieves a specified goal, specifically, granting a specified permission to a specified user. It provide rule-based access control policy language and the rule-based administrative policy model that controls addition and removal of facts and rules, and an abductive investigation procedure, can analyze policy rules even if the facts initially in the policy are unavailable, for user-permission reachability. Abductive investigation means that the algorithm by computing minimal sets of facts that, if existing in the early policy, imply reach ability of the goal. TABLE I Comparative Analysis Of Administrative Policy Techniques Author Techniques Advantages Disadvantages Reachability,availability Only few properties,containment and information are discussed flow properties Amit Sasturkar, Ping Yang, Scott D. Stoller and C.R. Ramakrishnan Robert Craven, Jorge Lobo and Jiefei Ma Moritz Y. Becker Role Based Access Control Logic-based policy analysis Dynamic, Authorization, Logic (DYNPAL) Simple restrictions on the policy language It emerges to properties of policies in heterogeneous environments Balances expressiveness with efficiency of evaluation and analysis It helps in conditional bulk insertions and retractions of authorization facts, nonmonotonic negation, and nested action definitions with transactional execution semantics Specific access requests on the authorization state Not extended to trust management policies Query languageis somewhat cumbersome Not upto the implementation level The analysis methods and resultscannot always be carried over, if the base language is moreexpressive than Datalog Difficult to come up withcorrect invariants Moritz Y. Becker and Sebastian Nanz State-Modifying Authorization Datalog-based ones, can thus be easily extended to support effects Properties of the states are not analyzed Goal-oriented algorithm for computing minimal sequences ISSN : Vol. 5 No. 11 Nov

5 Puneet Gupta, Scott D. Stoller, and Zhongyuan Xu - Tabling StatespaceExploration Revocable Rule- Based Data Access Control It controls addition and removal of facts and rules Policy rules can be analyzed even if the facts initially in the policy All the static and dynamic information in all states Extended to Trust management policy Achieve together forward and backward security Atom-reachability problem Lack of complete information about the initial policy III. CONCLUSION This paper mainly describes about the various administrative polices, which are used for providing the high end of security in computing and accessing objects effectively and securely. On surveying the different previous works, we analyzed the advantages and disadvantages of each work and finally we derived the new technique, which over comes the drawbacks of previous work by analyzing all the information s in all state of exploration and by providing the trustworthy environment. Finally we conclude that State-space exploration solves Atomreachability problem and Revocable Rule-Based Data Access Control which helps in achieving both forward security and backward security. IV. REFERENCES [1] R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, Role-BasedAccess Control Models, Computer, vol. 29, no. 2, pp , Feb [2] R. Sandhu, V. Bhamidipati, and Q. Munawer, The ARBAC97Model for Role-Based Administration of Roles, ACM Trans. Informationand Systems Security, vol. 2, no. 1, pp , Feb [3] M.Y. Becker, Specification and Analysis of Dynamic AuthorisationPolicies, Proc. 22nd IEEE Computer Security Foundations Symposium (CSF), pp , [4] R. Craven, J. Lobo, J. Ma, A. Russo, E. Lupu, and A. Bandara, Expressive Policy Analysis with Enhanced System Dynamicity, Proc. Fourth Int l Symp. Information, Computer, and Comm. Security (ASIACCS), pp , [5] M.Y. Becker and S. Nanz, A Logic for State-Modifying AuthorizationPolicies, ACM Trans. Information and System Security, vol. 13, no. 3, article 20, [6] M.Y. Becker and S. Nanz, The Role of Abduction in DeclarativeAuthorization Policies, Proc. 10th Int l Conf. Practical Aspects ofdeclarative Languages (PADL 08), ser. Lecture Notes in ComputerScience, vol. 4902, pp , [7] M.Y. Becker, J.F. Mackay, and B. Dillaway, Abductive AuthorizationCredential Gathering, Proc. IEEE Int l Symp. Policies for DistributedSystems and Networks (POLICY), pp. 1-8, July [8] A. Sasturkar, P. Yang, S.D. Stoller, and C.R. Ramakrishnan, Policy Analysis for Administrative Role Based Access Control, Theoretical Computer Science, vol. 412, no. 44, pp , Oct [9] Puneet Gupta, Scott D. Stoller, and Zhongyuan Xu, Abductive Analysis of Administrative Policiesin Rule-Based Access Control, IEEE Transactions On Dependable And Secure Computing, vol. 11, no. 5, pp ,sep [10] P. Gupta, Abductive Analysis of Administrative Policies in Rule-Based Access Control. Stony Brook Univ., Dec [11] M.Y. Becker and S. Nanz, A Logic for State-Modifying Authorization Policies, Proc. 12th European Symp. Research in Computer Security (ESORICS), pp , [12] S.D. Stoller, P. Yang, M. Gofman, and C.R. Ramakrishnan, Symbolic Reachability Analysis for Parameterized Administrative Role Based Access Control, Computers & Security, vol. 30, no. 2/3, pp , Mar.-May [13] R. Jin, V.E. Lee, and H. Hong, Axiomatic Ranking of NetworkRole Similarity, Proc. 17th ACM SIGKDD Int l Conf. Knowledge Discovery and Data Mining (KDD), pp , [14] A. Balmin, V. Hristidis, and Y. Papakonstantinou, Objectrank: Authority-Based Keyword Search in Databases, Proc. 30th Int l Conf. Very Large Data Bases (VLDB), pp , [15] B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu, Privacypreserving data publishing: A survey of recent developments, ACM CSUR, vol. 42, no. 4, Article 14, Jun [16] C. Dwork, A firm foundation for private data analysis, Commun. ACM, vol. 54, no. 1, pp , Jan [17] M. Barletta, S. Ranise, and L. Vigan_o, Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-Mechanizable Activities, Proc. Eighth Int l Workshop Security and Trust Management (STM), pp , [18] P. Gupta, S.D. Stoller, and Z. Xu, Abductive Analysis of Administrative Policies in Rule-Based Access Control, Proc. Seventh Int l Conf. Information Systems Security (ICISS 11), pp , Dec [19] M. Y. Becker and P. Sewell. Cassandra, Flexible trustmanagement, applied to electronic health records, CSFW, pp IEEE Computer Society, 2004 [20] N. Li and M.V. Tripunitara, Security Analysis in Role-Based Access Control, ACM Trans. Information and System Security, vol. 9, no. 4, pp , Nov [21] S.D. Stoller, P. Yang, C.R. Ramakrishnan, and M.I. Gofman, Efficient Policy Analysis for Administrative Role Based Access Control, Proc. 14th ACM Conf. Computer and Comm. Security (CCS), ISSN : Vol. 5 No. 11 Nov

An Object Oriented Role-based Access Control Model for Secure Domain Environments

An Object Oriented Role-based Access Control Model for Secure Domain Environments International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer

More information

Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis

Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 5 (Nov. - Dec. 2012), PP 36-41 Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis

More information

Strategic Role Engineering Approach to Visual Role Based Access Control (V-RBAC)

Strategic Role Engineering Approach to Visual Role Based Access Control (V-RBAC) International Journal of Computer Applications in Engineering Sciences [VOL III, ISSUE II, JUNE 2013] [ISSN: 2231-4946] Strategic Role Engineering Approach to Visual Role Based Access Control (V-RBAC)

More information

Towards a Rule-based Access Control Framework for Distributed Information Systems

Towards a Rule-based Access Control Framework for Distributed Information Systems Towards a Rule-based Access Control Framework for Distributed Information Systems Sergey Afonin Institute of Mechanics, Moscow State University Michurinskij av., 1, Moscow, Russian Federation Email: [email protected]

More information

A System for Interactive Authorization for Business Processes for Web Services

A System for Interactive Authorization for Business Processes for Web Services A System for Interactive Authorization for Business Processes for Web Services Hristo Koshutanski and Fabio Massacci Dip. di Informatica e Telecomunicazioni - Univ. di Trento via Sommarive 14-38050 Povo

More information

Accessing Private Network via Firewall Based On Preset Threshold Value

Accessing Private Network via Firewall Based On Preset Threshold Value IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold

More information

A UPS Framework for Providing Privacy Protection in Personalized Web Search

A UPS Framework for Providing Privacy Protection in Personalized Web Search A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,

More information

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: [email protected]

More information

Data management using Virtualization in Cloud Computing

Data management using Virtualization in Cloud Computing Data management using Virtualization in Cloud Computing A.S.R. Krishna Kanth M.Tech (CST), Department of Computer Science & Systems Engineering, Andhra University, India. M.Sitha Ram Research Scholar Department

More information

Mining Signatures in Healthcare Data Based on Event Sequences and its Applications

Mining Signatures in Healthcare Data Based on Event Sequences and its Applications Mining Signatures in Healthcare Data Based on Event Sequences and its Applications Siddhanth Gokarapu 1, J. Laxmi Narayana 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India 1

More information

A logical approach to dynamic role-based access control

A logical approach to dynamic role-based access control A logical approach to dynamic role-based access control Philippe Balbiani Yannick Chevalier Marwa El Houri Abstract Since its formalization RBAC has become the yardstick for the evaluation of access control

More information

ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638. www.ijsetr.com

ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638. www.ijsetr.com ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638 www.ijsetr.com Refining Efficiency of Cloud Storage Services using De-Duplication SARA BEGUM 1, SHAISTA NOUSHEEN 2, KHADERBI SHAIK 3 1 PG Scholar,

More information

IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD

IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated

More information

Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham

Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on

More information

KEYWORD SEARCH IN RELATIONAL DATABASES

KEYWORD SEARCH IN RELATIONAL DATABASES KEYWORD SEARCH IN RELATIONAL DATABASES N.Divya Bharathi 1 1 PG Scholar, Department of Computer Science and Engineering, ABSTRACT Adhiyamaan College of Engineering, Hosur, (India). Data mining refers to

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds Distributed Attribute Based Encryption for Patient Health Record Security under Clouds SHILPA ELSA ABRAHAM II ME (CSE) Nandha Engineering College Erode Abstract-Patient Health Records (PHR) is maintained

More information

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer. REVIEW ARTICLE ISSN: 2321-7758 UPS EFFICIENT SEARCH ENGINE BASED ON WEB-SNIPPET HIERARCHICAL CLUSTERING MS.MANISHA DESHMUKH, PROF. UMESH KULKARNI Department of Computer Engineering, ARMIET, Department

More information

Cassandra. References:

Cassandra. References: Cassandra References: Becker, Moritz; Sewell, Peter. Cassandra: Flexible Trust Management, Applied to Electronic Health Records. 2004. Li, Ninghui; Mitchell, John. Datalog with Constraints: A Foundation

More information

Integrating Policy-Driven Role Based Access Control with the Common Data Security Architecture

Integrating Policy-Driven Role Based Access Control with the Common Data Security Architecture Integrating Policy-Driven Role Based Access Control with the Common Data Architecture Along Lin Extended Enterprise Laboratory HP Laboratories Bristol HPL-1999-59 April, 1999 E-mail: [email protected]

More information

Efficient File Sharing Scheme in Mobile Adhoc Network

Efficient File Sharing Scheme in Mobile Adhoc Network Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:

More information

Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior

Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior N.Jagatheshwaran 1 R.Menaka 2 1 Final B.Tech (IT), [email protected], Velalar College of Engineering and Technology,

More information

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,

More information

Implementing XML-based Role and Schema Migration Scheme for Clouds

Implementing XML-based Role and Schema Migration Scheme for Clouds Implementing XML-based Role and Schema Migration Scheme for Clouds Gurleen Kaur 1, Sarbjeet Singh 2 Computer Science and Engineering, UIET Panjab University, Chandigarh, India 1 [email protected]

More information

CREATING MINIMIZED DATA SETS BY USING HORIZONTAL AGGREGATIONS IN SQL FOR DATA MINING ANALYSIS

CREATING MINIMIZED DATA SETS BY USING HORIZONTAL AGGREGATIONS IN SQL FOR DATA MINING ANALYSIS CREATING MINIMIZED DATA SETS BY USING HORIZONTAL AGGREGATIONS IN SQL FOR DATA MINING ANALYSIS Subbarao Jasti #1, Dr.D.Vasumathi *2 1 Student & Department of CS & JNTU, AP, India 2 Professor & Department

More information

Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.

Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Identity Based

More information

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of

More information

Analysis One Code Desc. Transaction Amount. Fiscal Period

Analysis One Code Desc. Transaction Amount. Fiscal Period Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00

More information

Policy Analysis for Administrative Role Based Access Control

Policy Analysis for Administrative Role Based Access Control Policy Analysis for Administrative Role Based Access Control Amit Sasturkar Ping Yang Scott D. Stoller C.R. Ramakrishnan Department of Computer Science, Stony Brook University, Stony Brook, NY, 11794,

More information

ACCELERATING SELECT WHERE AND SELECT JOIN QUERIES ON A GPU

ACCELERATING SELECT WHERE AND SELECT JOIN QUERIES ON A GPU Computer Science 14 (2) 2013 http://dx.doi.org/10.7494/csci.2013.14.2.243 Marcin Pietroń Pawe l Russek Kazimierz Wiatr ACCELERATING SELECT WHERE AND SELECT JOIN QUERIES ON A GPU Abstract This paper presents

More information

Efficient Query Optimizing System for Searching Using Data Mining Technique

Efficient Query Optimizing System for Searching Using Data Mining Technique Vol.1, Issue.2, pp-347-351 ISSN: 2249-6645 Efficient Query Optimizing System for Searching Using Data Mining Technique Velmurugan.N Vijayaraj.A Assistant Professor, Department of MCA, Associate Professor,

More information

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Abstract: Cloud computing is one of the emerge technologies. To protect the data and privacy of users the access

More information

A Semantic Approach for Access Control in Web Services

A Semantic Approach for Access Control in Web Services A Semantic Approach for Access Control in Web Services M. I. Yagüe, J. Mª Troya Computer Science Department, University of Málaga, Málaga, Spain {yague, troya}@lcc.uma.es Abstract One of the most important

More information

Introducing Formal Methods. Software Engineering and Formal Methods

Introducing Formal Methods. Software Engineering and Formal Methods Introducing Formal Methods Formal Methods for Software Specification and Analysis: An Overview 1 Software Engineering and Formal Methods Every Software engineering methodology is based on a recommended

More information

An Approach for Generating Concrete Test Cases Utilizing Formal Specifications of Web Applications

An Approach for Generating Concrete Test Cases Utilizing Formal Specifications of Web Applications An Approach for Generating Concrete Test Cases Utilizing Formal Specifications of Web Applications Khusbu Bubna RC Junit concrete test cases suitable for execution on the implementation. The remainder

More information

Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner

Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner 24 Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner Rekha S. Nyaykhor M. Tech, Dept. Of CSE, Priyadarshini Bhagwati College of Engineering, Nagpur, India

More information

Optimization of Image Search from Photo Sharing Websites Using Personal Data

Optimization of Image Search from Photo Sharing Websites Using Personal Data Optimization of Image Search from Photo Sharing Websites Using Personal Data Mr. Naeem Naik Walchand Institute of Technology, Solapur, India Abstract The present research aims at optimizing the image search

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

AN EFFECTIVE PROPOSAL FOR SHARING OF DATA SERVICES FOR NETWORK APPLICATIONS

AN EFFECTIVE PROPOSAL FOR SHARING OF DATA SERVICES FOR NETWORK APPLICATIONS INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFECTIVE PROPOSAL FOR SHARING OF DATA SERVICES FOR NETWORK APPLICATIONS Koyyala Vijaya Kumar 1, L.Sunitha 2, D.Koteswar Rao

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume, Issue, March 201 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Efficient Approach

More information

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35,

More information

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA

SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. [email protected] Mrs.

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

Floating Point Fused Add-Subtract and Fused Dot-Product Units

Floating Point Fused Add-Subtract and Fused Dot-Product Units Floating Point Fused Add-Subtract and Fused Dot-Product Units S. Kishor [1], S. P. Prakash [2] PG Scholar (VLSI DESIGN), Department of ECE Bannari Amman Institute of Technology, Sathyamangalam, Tamil Nadu,

More information

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India

More information

IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE

IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE 1 Rajesh L Gaikwad, 2 Dhananjay M Dakhane, 3 Ravindra L Pardhi M.E Student, Associate Professor, Assistant Professor,

More information

feature requirements engineering

feature requirements engineering feature requirements engineering Exploring Alternatives during Requirements Analysis John Mylopoulos, University of Toronto Goal-oriented requirements analysis techniques provide ways to refine organizational

More information

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment International Journal of Computational Engineering Research Vol, 03 Issue, 11 Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment D.Dhivya 1, S.CHINNADURAI 2 1,M.E.(Cse),

More information

AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA

AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Secure Data Sharing in Cloud Computing using Hybrid cloud

Secure Data Sharing in Cloud Computing using Hybrid cloud International Journal of Electronics and Computer Science Engineering 144 Available Online at www.ijecse.org ISSN: 2277-1956 Secure Data Sharing in Cloud Computing using Hybrid cloud Er. Inderdeep Singh

More information

ACL Based Dynamic Network Reachability in Cross Domain

ACL Based Dynamic Network Reachability in Cross Domain South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer

More information

CHAPTER 22 Database Security Integration Using Role-Based Access Control

CHAPTER 22 Database Security Integration Using Role-Based Access Control CHAPTER 22 Database Security Integration Using Role-Based Access Control Sylvia Osborn Department of Computer Science, The University of Western Ontario London, Ontario, Canada, N6A-5B7 [email protected]

More information

Finding Execution Faults in Dynamic Web Application

Finding Execution Faults in Dynamic Web Application International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 445-452 International Research Publications House http://www. irphouse.com /ijict.htm Finding

More information

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India

More information

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving, Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party

More information

Process Mining in Big Data Scenario

Process Mining in Big Data Scenario Process Mining in Big Data Scenario Antonia Azzini, Ernesto Damiani SESAR Lab - Dipartimento di Informatica Università degli Studi di Milano, Italy antonia.azzini,[email protected] Abstract. In

More information

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.

More information

Mining Association Rules: A Database Perspective

Mining Association Rules: A Database Perspective IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December 2008 69 Mining Association Rules: A Database Perspective Dr. Abdallah Alashqur Faculty of Information Technology

More information

ATTRIBUTE-BASED ACCESS CONTROL MODELS AND IMPLEMENTATION IN CLOUD INFRASTRUCTURE AS A SERVICE

ATTRIBUTE-BASED ACCESS CONTROL MODELS AND IMPLEMENTATION IN CLOUD INFRASTRUCTURE AS A SERVICE ATTRIBUTE-BASED ACCESS CONTROL MODELS AND IMPLEMENTATION IN CLOUD INFRASTRUCTURE AS A SERVICE APPROVED BY SUPERVISING COMMITTEE: Ravi Sandhu, Ph.D., Co-Chair Ram Krishnan, Ph.D., Co-Chair Rajendra V. Boppana,

More information

Comparative Analysis of EM Clustering Algorithm and Density Based Clustering Algorithm Using WEKA tool.

Comparative Analysis of EM Clustering Algorithm and Density Based Clustering Algorithm Using WEKA tool. International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 9, Issue 8 (January 2014), PP. 19-24 Comparative Analysis of EM Clustering Algorithm

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]

More information

A Secure Mediator for Integrating Multiple Level Access Control Policies

A Secure Mediator for Integrating Multiple Level Access Control Policies A Secure Mediator for Integrating Multiple Level Access Control Policies Isabel F. Cruz Rigel Gjomemo Mirko Orsini ADVIS Lab Department of Computer Science University of Illinois at Chicago {ifc rgjomemo

More information

Implementation of hybrid software architecture for Artificial Intelligence System

Implementation of hybrid software architecture for Artificial Intelligence System IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.1, January 2007 35 Implementation of hybrid software architecture for Artificial Intelligence System B.Vinayagasundaram and

More information

ANALYSIS OF WORKFLOW SCHEDULING PROCESS USING ENHANCED SUPERIOR ELEMENT MULTITUDE OPTIMIZATION IN CLOUD

ANALYSIS OF WORKFLOW SCHEDULING PROCESS USING ENHANCED SUPERIOR ELEMENT MULTITUDE OPTIMIZATION IN CLOUD ANALYSIS OF WORKFLOW SCHEDULING PROCESS USING ENHANCED SUPERIOR ELEMENT MULTITUDE OPTIMIZATION IN CLOUD Mrs. D.PONNISELVI, M.Sc., M.Phil., 1 E.SEETHA, 2 ASSISTANT PROFESSOR, M.PHIL FULL-TIME RESEARCH SCHOLAR,

More information

The CVS-Server Case Study: A Formalized Security Architecture

The CVS-Server Case Study: A Formalized Security Architecture The CVS-Server Case Study: A Formalized Security Architecture Extended Abstract Achim D. Brucker, Frank Rittinger, and Burkhart Wolff {brucker,rittinge,wolff}@informatik.uni-freiburg.de 1 Introduction

More information

InvGen: An Efficient Invariant Generator

InvGen: An Efficient Invariant Generator InvGen: An Efficient Invariant Generator Ashutosh Gupta and Andrey Rybalchenko Max Planck Institute for Software Systems (MPI-SWS) Abstract. In this paper we present InvGen, an automatic linear arithmetic

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

Determination of the normalization level of database schemas through equivalence classes of attributes

Determination of the normalization level of database schemas through equivalence classes of attributes Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,

More information

Secure Cloud Transactions by Performance, Accuracy, and Precision

Secure Cloud Transactions by Performance, Accuracy, and Precision Secure Cloud Transactions by Performance, Accuracy, and Precision Patil Vaibhav Nivrutti M.Tech Student, ABSTRACT: In distributed transactional database systems deployed over cloud servers, entities cooperate

More information

KNOWLEDGE DISCOVERY and SAMPLING TECHNIQUES with DATA MINING for IDENTIFYING TRENDS in DATA SETS

KNOWLEDGE DISCOVERY and SAMPLING TECHNIQUES with DATA MINING for IDENTIFYING TRENDS in DATA SETS KNOWLEDGE DISCOVERY and SAMPLING TECHNIQUES with DATA MINING for IDENTIFYING TRENDS in DATA SETS Prof. Punam V. Khandar, *2 Prof. Sugandha V. Dani Dept. of M.C.A., Priyadarshini College of Engg., Nagpur,

More information

Keywords: Information Retrieval, Vector Space Model, Database, Similarity Measure, Genetic Algorithm.

Keywords: Information Retrieval, Vector Space Model, Database, Similarity Measure, Genetic Algorithm. Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Effective Information

More information

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

More information

A Framework of User-Driven Data Analytics in the Cloud for Course Management

A Framework of User-Driven Data Analytics in the Cloud for Course Management A Framework of User-Driven Data Analytics in the Cloud for Course Management Jie ZHANG 1, William Chandra TJHI 2, Bu Sung LEE 1, Kee Khoon LEE 2, Julita VASSILEVA 3 & Chee Kit LOOI 4 1 School of Computer

More information

International Journal of World Research, Vol: I Issue XIII, December 2008, Print ISSN: 2347-937X DATA MINING TECHNIQUES AND STOCK MARKET

International Journal of World Research, Vol: I Issue XIII, December 2008, Print ISSN: 2347-937X DATA MINING TECHNIQUES AND STOCK MARKET DATA MINING TECHNIQUES AND STOCK MARKET Mr. Rahul Thakkar, Lecturer and HOD, Naran Lala College of Professional & Applied Sciences, Navsari ABSTRACT Without trading in a stock market we can t understand

More information

Verifying Semantic of System Composition for an Aspect-Oriented Approach

Verifying Semantic of System Composition for an Aspect-Oriented Approach 2012 International Conference on System Engineering and Modeling (ICSEM 2012) IPCSIT vol. 34 (2012) (2012) IACSIT Press, Singapore Verifying Semantic of System Composition for an Aspect-Oriented Approach

More information

An Analysis on Density Based Clustering of Multi Dimensional Spatial Data

An Analysis on Density Based Clustering of Multi Dimensional Spatial Data An Analysis on Density Based Clustering of Multi Dimensional Spatial Data K. Mumtaz 1 Assistant Professor, Department of MCA Vivekanandha Institute of Information and Management Studies, Tiruchengode,

More information

Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud

Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud R.Udhayakumar 1, M. Jawahar 2, I.Ramasamy 3 PG Student, Dept. Of CSE,KSR Institute For Engineering

More information

TECH. Requirements. Why are requirements important? The Requirements Process REQUIREMENTS ELICITATION AND ANALYSIS. Requirements vs.

TECH. Requirements. Why are requirements important? The Requirements Process REQUIREMENTS ELICITATION AND ANALYSIS. Requirements vs. CH04 Capturing the Requirements Understanding what the customers and users expect the system to do * The Requirements Process * Types of Requirements * Characteristics of Requirements * How to Express

More information

PULLING OUT OPINION TARGETS AND OPINION WORDS FROM REVIEWS BASED ON THE WORD ALIGNMENT MODEL AND USING TOPICAL WORD TRIGGER MODEL

PULLING OUT OPINION TARGETS AND OPINION WORDS FROM REVIEWS BASED ON THE WORD ALIGNMENT MODEL AND USING TOPICAL WORD TRIGGER MODEL Journal homepage: www.mjret.in ISSN:2348-6953 PULLING OUT OPINION TARGETS AND OPINION WORDS FROM REVIEWS BASED ON THE WORD ALIGNMENT MODEL AND USING TOPICAL WORD TRIGGER MODEL Utkarsha Vibhute, Prof. Soumitra

More information

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR

More information

A Secure Decentralized Access Control Scheme for Data stored in Clouds

A Secure Decentralized Access Control Scheme for Data stored in Clouds A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University

More information

How To Create A Role Based Access Control System For Context Aware Environments

How To Create A Role Based Access Control System For Context Aware Environments A Role and Attribute Based Access Control System Using Semantic Web Technologies Lorenzo Cirio 1,IsabelF.Cruz 1,andRobertoTamassia 2 1 University of Illinois at Chicago {lcirio ifc}@cs.uic.edu 2 Brown

More information