Strategic Role Engineering Approach to Visual Role Based Access Control (V-RBAC)
|
|
|
- Logan Lambert
- 10 years ago
- Views:
Transcription
1 International Journal of Computer Applications in Engineering Sciences [VOL III, ISSUE II, JUNE 2013] [ISSN: ] Strategic Role Engineering Approach to Visual Role Based Access Control (V-RBAC) M. Shubin Aldo Department of Information Technology DMI College of Engineering, Chennai, Tamil Nadu, India. Abstract -- Work on Role Based Access Control (RBAC) has emerged as the principle type of access control model in theory and practice. RBAC has frequently been criticized for the difficulty of setting up an initial role structure and for inflexibility in rapidly changing application. This paper offers a new role engineering approach to Role- Based Access Control (RBAC), referred to as visual role mining. The key idea is to graphically represent userpermission assignments to enable quick analysis and elicitation of meaningful roles. In turn, we propose an idea of merging two algorithms in a hybrid fashion: ADVISER and EXTRACT. The former role structure is a heuristic used to represent the user-permission assignments of a given set of roles. The proposed hybrid approach is a fast probabilistic algorithm that, when used in conjunction with ADVISER, allows for a visual elicitation of roles even in absence of predefined roles. Results confirm the quality of the proposal and demonstrate its viability in supporting role engineering decisions. Keywords Role Based Access control, Visualization, Role engineering, Role Mining. I. INTRODUCTION Access Control is a method of regulating access to computer or network resources based on the roles of individual users within an enterprise. By leveraging on the observations made in the previous section, we now describe a viable, fast heuristic algorithm called ADVISER (Access Data Visualizer). Given a set of roles, this algorithm is able to provide a compact representation of them. In particular it reorders rows and columns of the user-permission matrix to minimize the fragmentation of each role.the more fragments in the visualization of a role, the higher the role visualization cost. Reordering users but not permissions only affects the number of gaps between columns, and so do Permissions (i.e., Rows and columns are sorted independently). According to our expectation, the visualization cost decreases as the number of samples increases. Finally, extensive applications over real and public data confirm that our approach is efficient, both in terms of computational time and result quality. A. Role Based Access Control Role Based Access Control also known as RBAC, [2] provides a popular model for information security that helps reduce the complexity of security administration and supports review of permissions assigned to users. This feature is critical to organizations that must determine their risk exposure from employee IT system access. The concept of [13] role-based access control (RBAC) began with multi-user and multi application on-line systems pioneered in the 1970s. The central idea of RBAC is that permissions are associated with roles, and users are assigned to appropriate roles. This greatly simplifies management of permissions. Roles permissions are created for the various job functions in an organization and users are assigned roles based on their responsibilities and qualifications. Fig. 1 Core RBAC RBAC provides benefits in properly administered systems which enable users to carry out a broad range of authorized operations, provides great flexibility and breadth of application. System administrators can control access at a level of abstraction that is natural to the way that enterprises typically conduct business. This is achieved by statically and dynamically regulating users actions through the establishment and definition of roles, role hierarchies, relationships, and constraints. Once an RBAC framework is established for an organization, the principal administrative actions are the granting and revoking of users into and out of roles. 84 P a g e
2 Shubin Aldo B. Visualization Visualization is the study of the visual representation of data, meaning "information that has been abstracted in some schematic form, including attributes or variables for the units of information". Mainstream data mining techniques significantly limit the role of human reasoning and insight. Likewise, in data visualization, the role of computational analysis is relatively small. The power demonstrated individually by these approaches to knowledge discovery suggests that somehow uniting the two could lead to increased efficiency and more valuable results. Information Visualization in Data Mining and Knowledge Discovery is the first book to ask and answer these thought-provoking questions. It is also the first book to explore the fertile ground of uniting data mining and data visualization principles in a new set of knowledge discovery techniques. Leading researchers from the fields of data mining, data visualization, and statistics present findings organized around topics introduced in two recent international knowledge discovery and data mining workshops. Collected and edited by three of the area's most influential figures, these chapters introduce the concepts and components of visualization, detail current efforts to include visualization and user interaction in data mining, and explore the potential for further synthesis of data mining algorithms and data visualization techniques. This incisive, groundbreaking research is sure to wield a strong influence in subsequent efforts in both academic and corporate settings. C. Role Mining Role mining is the process of analyzing user-toresource mapping data to determine or modify user permissions for role-based access control (RBAC) in an enterprise. In a business setting, roles are defined according to job competency, authority and responsibility. The ultimate intent of role mining is to achieve optimal security administration based on the role each individual plays within the organization. Role mining can be done in three ways, called bottom-up, top-down and by-example. In bottom-up role mining, users are given pre-existing roles based on their skills or duties. In top-down role mining, roles are formulated to match the skills or duties of individual users. In byexample role mining, roles are matched with user skills and duties as defined by managers. Role mining (role discovery) uses expectation maximization and cobweb clustering algorithms to discover relationships between users based on similar access permissions that can logically be grouped to form a role. 85 P a g e The role mining process consists of three steps, first is the Setting role mining attributes, Second Creating and running a role mining task and finally Analyzing role mining results and configuring and saving roles. II. LITERATURE REVIEW Ravi S. Sandu, [15] introduces a family of references model for RBAC in which permissions are associated with role, and users are made member of appropriate roles. This greatly simplifies management of permissions. Roles are closely related to the concept of user groups in access control. However, a role brings together a set of users on one side and a set of permissions on the other, whereas user groups are typically defined as a set of users only. Longhua Zhang, et al [12], in their paper they introduce a systematic approach to specify delegation and revocation policies using a set of rules. They demonstrate the feasibility of their framework through policy specification, enforcement, and a proof-of-concept implementation on specific domains, e.g. the healthcare environment. They believe that their work can be applied to organizations that rely heavily on collaborative tasks. David F. Ferraiolo et al provide a simple formal description in terms of sets and relations of role based access control.there is no commonly accepted formal definition and standards encompassing RBAC. Sabrina De Capitani di Vimercati et al, achieve a main security services (i.e) Data protection by the concept of Access control. But, There is incompleteness and inconsistency. L. Wang, et al [11], introduce flexibility into the procedure of role assignment, ideas are borrowed from ABAC. In an ABAC system, permissions are associated with a set of rules expressed on measurable parameters and are granted to users who can prove compliance with these rules. Based on the analysis of Miao Liu, et al [9], the access control requirements for web services, this paper points out the limitation of current access control models for web services, and presents an attribute and role based access control model for web services. The model automatically produces the role set, accomplishes the mapping among users, permissions and roles, and unifies the access control for web services and data resources involved. SHEN Hai-bo, et al [8], introduces a key challenge in Web services security is the design of effective access control schemes. However, most current access control systems base authorization decisions on subject s identity. Administrative scalability and control granularity are serious problems in those systems, and they are not fit for Web services environment. Lorenzo Cirio, et al [5], they show how Semantic Web
3 Strategic Role Engineering Approach to Visual Role Based Access Control (V-RBAC) technologies can be used to build an access control system. They follow the role-based access control approach (RBAC) and extend it with contextual attributes. Their approach provides for the dynamic association of roles with users. A Description Logic (DL) reasoner is used to classify both users and resources, and verify the consistency of the access control policies. Finally, they provide a proof-of concept implementation of the system written in Java. Ali E. Abdallah, et al [3], in their paper, they clarify the key role-based delegation concepts and define a number of RBAC delegation models with different characteristics. They start by introducing delegation to the simplest core RBAC model. They then refine the core RBAC model to support role hierarchy and show how to integrate delegation and revocation in the hierarchical model. Yonghe Wei, et al [2], presents an attribute and role based access control model for services oriented environment. They have described these components in detail and outlined their interactions. The proposed model introduces the notions of business role and service role, defines an automatically produces service role method based on attribute conditions to assign users to service roles, unifies the access control for web services and data resources involved. Finally, they give an access control algorithm for services. This model can provide finegrained, supporting composite service access control and mechanism independent access control policy. Ian Molloy et al, introduces a new role mining algorithm and two new ways for generating datasets for evaluation. But, here difficult to handle attribute information. III. VISUAL ROLE BASED ACCESS CONTROL (V-RBAC) This approach is used for setting the roles and permissions for the user working in the particular field. We are applying the visualization pattern to view the user s roles and permissions in the graphical form. To achieve this, a hybrid algorithm is proposed: Adviser and Extract. By implementing this algorithm visualization occurs. From this VRBAC will provide quick access of viewing the user s roles, permission and their complete details in no time. A. System Architecture The proposed design is to build a role structure along with the handlers into the Role Based Access Control where the roles and permissions be assigned to the trusted user. 1) Application Controller: User s details such as name, age, address, mail id, gender, phone number, educational qualifications, work experiences etc will be collected in the form of registration aspect and stored in database by the application controller. The privilege of the user will be analyzed according to his/her details in the database and then will be sent to the access control layer. 2) Task Scheduling: When the user login into the page, the application controller assign the roles and permission to the privileged users. The handlers will perform this process. 3) Data Access Control: Access control is the process of mediating requests to data and services maintained by a system, determining which requests should be granted or denied. Fig 2. System Architecture 4) Content Manipulation: In our Role Mining concepts with out using database administration we try to perform manipulations. But we couldn t perform entire operation based in files only few operation are consider as a role because of security reasons we play a manipulations like inserting, deleting as well as setting permissions to their employees. 5) Administrator Agent: The system admin is one who maintains the database and controls the overall process being done in the architecture. The admin will collect the user details and stores it in database for later references, the admin will analyze about the user and provide privilege and assign a role for the particular user. Also admin will set predefined rules for an attribute which cannot be modified by anyone else. The admin will provide access control for the users so that the user should perform the action which is only assigned to him. Admin will also maintain the role structure of the organization so that even if a user 86 P a g e
4 Shubin Aldo leaves, immediately the roles and permissions will be set for the next privileged user according to the delegation constraint. B. Matrix Representation The role mining objective is to analyze access control data in order to elicit a set of meaningful roles that simplify RBAC management. Various business information can be analyzed but user-permission assignments are the minimal data set required. A natural representation for this information is the binary matrix, where rows and columns correspond to users and permissions, and each cell is on when a certain user has a certain permission granted. In this algorithm, it extracts the particular userpermission assignments. 1. Procedure EXTRACT(UP, K) 2. P-ROLES,P-UA, P-PA 0 3. For i = 1...k do 4. Pick (u,p) UP uniformly at random 5. U users(p) 6. P perms(u) IV. RESULTS AND ANALYSIS A visual representation can highlight potential exceptions within data in an effective manner and a textual role representation reports on information about role-user and role-permission relationships in a less communicative fashion than a graphical representation. Fig 3. Role Matrix C. Algorithm Description We propose hybrid algorithms merging ADVISER and EXTRACT. In ADVISER algorithm, it reorders rows and columns of the user permission matrix. Reordering users but not permissions only affects the number of gaps between columns, and so do Permissions. In EXTRACT algorithm, it extracts the particular user-permission assignments. ADVISER: In this algorithm, it reorders rows and columns of the user permission matrix. Reordering users but not permissions only affects the number of gaps between columns, and so do Permissions. 1. Procedure ADVISER(USERS, PERMS, ROLES, UA, PA) 2. σ U SORTSET(USERS, UA, ROLES) 3. σ P SORTSET(PERMS, PA, ROLES) 4. return σ U, σ P 5. end procedure EXTRACT The graph shows the roles assigned for each user. Also this proposed work will support for dynamic attributes since delegation constraint is added which are used to determine the user permissions and the ability to quickly determine the maximum permissions available to each user, also separate roles are not needed to be framed since the attribute itself will grant the access decisions and assign all conditions needed to the user. By analysing we believe this is an appropriate approach that will retain the benefits of RBAC while extending its utility to today s important distributed applications. 87 P a g e
5 Strategic Role Engineering Approach to Visual Role Based Access Control (V-RBAC) V. CONCLUSION AND FUTURE WORK Role Based Access Control is the best among all access control techniques. But still there are few issues in the Role Engineering criteria. To overcome this problem we have proposed an idea by proposing a hybrid algorithm that supports role mining and role visualization techniques which in turn gives an effective and flexible role engineering approach. Thus this work concludes that the algorithm used in the proposed system represents easy access for applications like banking information system, payroll system, large organizations etc where large number of users involved. This work can be further enhanced by applying various constraints. [13] Al-Kahtani M.A. and Sandhu R. A model for attribute-based user-role assignment Computer Security Applications Conference, 2002, pp [14] E. Barka and R. Sandhu 'Framework for role-based delegation models', Proceedings of the 16th Annual Computer Security Applications Conference ACSAC '00, 2000, pp [15] Sandhu, R.S., Coyne E.J., Feinstein H.L. and Youman C.E. Role-based access control models Computer Volume: 29, Issue: 2, pp , Feb [16] E.J. Coyne, Role-Engineering, Proc. ACM Workshop Role- Based Access Control (RBAC 95), pp , REFERENCES [1] Alessandro Colantonio,et al Visual Role Mining:A Picture Is Worth a Thousand roles IEEE Transactions on Knowledge and Data Engineering Vol 24,June [2] I. Molloy, N. Li, T. Li, Z. Mao, Q. Wang, and J. Lobo, Evaluating Role Mining Algorithms, Proc. 14th ACM Symp. Access Control Models and Technologies (SACMAT 09), pp , 2009.Yonghe Wei, Chunjing Shi and Weiping Shao. An attribute and role based access control model for serviceoriented environment Control and Decision Conference (CCDC 10), 2010, pp [3] Ali E. Abdallah and Hassan Takabi Formalizing Delegation and integrating it into Role Based Access Control Journal of Information Assurance and Security, Issue: 5, pp , [4] Manachai Toahchoodee, Xing Xie and Indrakshi Ray 'Towards Trustworthy Delegation in Role-Based Access Control Model', Information Security, Volume 5735, pp , [5] A. Colantonio, R. Di Pietro, A. Ocello, and N.V. Verde, A Formal Framework to Elicit Roles with Business Meaning in RBAC Systems, Proc. 14th ACM Symp. Access Control Models and Technologies (SACMAT 09), pp , [6] A. Colantonio, R. Di Pietro, and A. Ocello, A Cost-driven Approach to Role Engineering, Proc. ACM Symp. Applied Computing (SAC 08), pp , [7] Lorenzo Cirio, Isabel F. Cruz and Roberto Tamassia. A role and attribute based access control system using semantic web technologies Proceedings of the 2007 OTM, Volume Part II, pp [8] Zhu Yi-qun, Li Jian-hua and Zhang Quan-hai. A General Attribute based RBAC Model for Web Service Services Computing, SCC 07, 2007, pp [9] N. Li, J. Byun and E. Bertino. A Critique of the ANSI Standard on Role-Based Access Control, IEEE Security & Privacy, pp , Nov [10] Miao Liu, He-Qing Guo and Jin-Dian Su. An attribute and role based access control model for Web services Machine Learning and Cybernetics, 2005, Volume: 2, pp [11] L. Wang, D. Wijesekera and S. Jajodia. A logic-based framework for attribute based access control. In ACM Workshop on Formal Methods in Security Engineering (FMSE), 2004, pp [12] Longhua Zhang, Gail-Joon Ahn and Bei-Tseng Chu 'A rolebased delegation framework for healthcare information systems', SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies, 2002, pp P a g e
Role Based Access Control (RBAC) Nicola Zannone
Role Based Access Control (RBAC) Nicola Zannone 1 DAC and MAC Discretionary Access Control (DAC) Access control determined by the owner of an object Oner can delegate access rights to other users Access
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud
Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Gajanan Ganorkar, Prof. A.B. Deshmukh, Prof M.D.Tambhakhe Information Technology Email:[email protected] Contact: 8600200142
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on
Role Based Access Control
Role Based Access Control Role-Based Access Control Models. By R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, IEEE Computer, vol 29(2):38--47, February 1996. The most cited paper in access control!
A CROSS - DOMAIN ROLE MAPPING AND AUTHORIZATION FRAMEWORK FOR RBAC IN GRID SYSTEMS
International Journal of Computer Science and Applications c 2009 Technomathematics Research Foundation Vol.6 No.1, pp. 1-12 A CROSS - DOMAIN ROLE MAPPING AND AUTHORIZATION FRAMEWORK FOR RBAC IN GRID SYSTEMS
How To Create A Role Based Access Control System For Context Aware Environments
A Role and Attribute Based Access Control System Using Semantic Web Technologies Lorenzo Cirio 1,IsabelF.Cruz 1,andRobertoTamassia 2 1 University of Illinois at Chicago {lcirio ifc}@cs.uic.edu 2 Brown
Analysis of Different Access Control Mechanism in Cloud
Analysis of Different Access Control Mechanism in Cloud Punithasurya K Post Graduate Scholar Department of Information Technology Karunya University, India Jeba Priya S Lecturer Department of Information
UML/OCL based Design and Analysis of Role-Based Access Control Policies
UML/OCL based Design and Analysis of Role-Based Access Control Policies Oliver Hofrichter, Martin Gogolla, and Karsten Sohr University of Bremen, Computer Science Department Database Systems Group, D-28334
Role Based Access Control Framework for Network Enterprises
Role Based Access Control Framework for Network Enterprises Dan Thomsen, Dick O Brien, and Jessica Bogle Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113 [email protected]
Implementing XML-based Role and Schema Migration Scheme for Clouds
Implementing XML-based Role and Schema Migration Scheme for Clouds Gurleen Kaur 1, Sarbjeet Singh 2 Computer Science and Engineering, UIET Panjab University, Chandigarh, India 1 [email protected]
CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS
CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS Shilpa G S 1, Maria Navin J R 2 1 PG Student, Dept. of Computer Science and Engineering, SVCE Bangalore,
A Semantic Approach for Access Control in Web Services
A Semantic Approach for Access Control in Web Services M. I. Yagüe, J. Mª Troya Computer Science Department, University of Málaga, Málaga, Spain {yague, troya}@lcc.uma.es Abstract One of the most important
Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI
Volume: 2, Issue: 7, 20-27 July 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Miss Rohini Vidhate Savitribai Phule Pune University. Mr. V. D. Shinde Savitribai
Integrating Attributes into Role-Based Access Control
Integrating Attributes into Role-Based Access Control Qasim Mahmood Rajpoot 1(B), Christian Damsgaard Jensen 1, and Ram Krishnan 2 1 Department of Applied Mathematics and Computer Science, Technical University
EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING K.Saipriya 1, A.Ravi Kumar 2 1 M.Tech Student, Dept of
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of
Role-based access control. RBAC: Motivations
Role-based access control 1 RBAC: Motivations Complexity of security administration For large number of subjects and objects, the number of authorizations can become extremely large For dynamic user population,
Extended RBAC Based Design and Implementation for a Secure Data Warehouse
Extended RBAC Based Design and Implementation for a Data Warehouse Dr. Bhavani Thuraisingham The University of Texas at Dallas [email protected] Srinivasan Iyer The University of Texas
A Secure Mediator for Integrating Multiple Level Access Control Policies
A Secure Mediator for Integrating Multiple Level Access Control Policies Isabel F. Cruz Rigel Gjomemo Mirko Orsini ADVIS Lab Department of Computer Science University of Illinois at Chicago {ifc rgjomemo
Secure Data Sharing in Cloud Computing using Hybrid cloud
International Journal of Electronics and Computer Science Engineering 144 Available Online at www.ijecse.org ISSN: 2277-1956 Secure Data Sharing in Cloud Computing using Hybrid cloud Er. Inderdeep Singh
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
Accessing Private Network via Firewall Based On Preset Threshold Value
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold
Role Based Encryption with Efficient Access Control in Cloud Storage
Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India
Towards Securing APIs in Cloud Computing
Towards Securing APIs in Cloud Computing Kumar Gunjan #1, R. K. Tiwari *2, G. Sahoo #3 # Department of Information Technology, Birla Institute of Technology, Mesra Ranchi, India * RVS College of Engineering&
Application Based Access Control on Cloud Networks for Data Security
Application Based Access Control on Cloud Networks for Data Security Ms. Smitha P M.Tech in DCN, Department of ECE GSSSIETW, Mysuru Karnataka, India Smitha.21sn @gmail.com Mrs. Manjula G Associate. Proffesor,
Implement role based access control with attribute certificates
Implement role based access control with attribute certificates Wei Zhou Computer Science Department University of Trier D-54286 Trier, Germany [email protected] Christoph Meinel Computer Science Department
A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang
A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang ABSTRACT In recent years, many large organizations have used the Role Based Access Control (RBAC) Workflow
IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD
Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated
Distributed Framework for Data Mining As a Service on Private Cloud
RESEARCH ARTICLE OPEN ACCESS Distributed Framework for Data Mining As a Service on Private Cloud Shraddha Masih *, Sanjay Tanwani** *Research Scholar & Associate Professor, School of Computer Science &
Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment
International Journal of Computational Engineering Research Vol, 03 Issue, 11 Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment D.Dhivya 1, S.CHINNADURAI 2 1,M.E.(Cse),
ACaaS: Access Control as a Service for IaaS Cloud
ACaaS: Access Control as a Service for IaaS Cloud Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn, Hadi Sharifi and Haiyong Xie Arizona State University, Tempe, AZ 85287, USA Email: {ruoyu.wu, gahn, hsharif1}@asu.edu
Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis
Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis Derek Foo 1, Jin Guo 2 and Ying Zou 1 Department of Electrical and Computer Engineering 1 School of Computing 2 Queen
A Survey on Administrative Policies in Rule- Based Access Control
A Survey on Administrative Policies in Rule- Based Access Control Thirunavukkarasu S PG scholar, Maharaja Engineering College, Avinashi, India. [email protected] S.Umarani Assistant Professor, Maharaja
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.
Formal Methods for Preserving Privacy for Big Data Extraction Software
Formal Methods for Preserving Privacy for Big Data Extraction Software M. Brian Blake and Iman Saleh Abstract University of Miami, Coral Gables, FL Given the inexpensive nature and increasing availability
Risk-Aware Role-Based Access Control
Risk-Aware Role-Based Access Control Liang Chen and Jason Crampton Information Security Group and Department of Mathematics Royal Holloway, University of London {liang.chen.2005,jason.crampton}@rhul.ac.uk
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
A Naïve Approach for Managing Virtualized Resources and Optimistic cost
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 3 (2012), pp. 167-171 International Research Publications House http://www. ripublication.com A Naïve Approach
IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE
IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE 1 Rajesh L Gaikwad, 2 Dhananjay M Dakhane, 3 Ravindra L Pardhi M.E Student, Associate Professor, Assistant Professor,
CHAPTER 22 Database Security Integration Using Role-Based Access Control
CHAPTER 22 Database Security Integration Using Role-Based Access Control Sylvia Osborn Department of Computer Science, The University of Western Ontario London, Ontario, Canada, N6A-5B7 [email protected]
Pitfalls and Best Practices in Role Engineering
Bay31 Role Designer in Practice Series Pitfalls and Best Practices in Role Engineering Abstract: Role Based Access Control (RBAC) and role management are a proven and efficient way to manage user permissions.
Role-based Authorization Constraints Specification Using Object Constraint Language
Role-based Authorization Constraints Specification Using Object Constraint Language Gail-Joon Ahn Department of Computer Science University of North Carolina at Charlotte [email protected] Michael. E. Shin
Distributed Attribute Based Encryption for Patient Health Record Security under Clouds
Distributed Attribute Based Encryption for Patient Health Record Security under Clouds SHILPA ELSA ABRAHAM II ME (CSE) Nandha Engineering College Erode Abstract-Patient Health Records (PHR) is maintained
Completeness, Versatility, and Practicality in Role Based Administration
Completeness, Versatility, and Practicality in Role Based Administration Slobodan Vukanović [email protected] Abstract Applying role based administration to role based access control systems has
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments Abhishek Majumder, Suyel Namasudra and Samir Nath Abstract Cloud computing is an emerging and highly attractive technology
EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary
A Critique of the ANSI Standard on Role Based Access Control
A Critique of the ANSI Standard on Role Based Access Control Ninghui Li Ji-Won Byun Elisa Bertino CERIAS and Department of Computer Science Purdue University 656 Oval Drive, West Lafayette, IN 47907-2086
Database Security. The Need for Database Security
Database Security Public domain NASA image L-1957-00989 of people working with an IBM type 704 electronic data processing machine. 1 The Need for Database Security Because databases play such an important
Role-Based Access Control Requirements Model with Purpose Extension
Role-Based Access Control Requirements Model with Purpose Extension Faranak Farzad 1, Eric Yu Faculty of Information Studies University of Toronto, Canada Patrick C. K. Hung Faculty of Business and Information
VISUALIZATION APPROACH FOR SOFTWARE PROJECTS
Canadian Journal of Pure and Applied Sciences Vol. 9, No. 2, pp. 3431-3439, June 2015 Online ISSN: 1920-3853; Print ISSN: 1715-9997 Available online at www.cjpas.net VISUALIZATION APPROACH FOR SOFTWARE
Saving Mobile Battery Over Cloud Using Image Processing
Saving Mobile Battery Over Cloud Using Image Processing Khandekar Dipendra J. Student PDEA S College of Engineering,Manjari (BK) Pune Maharasthra Phadatare Dnyanesh J. Student PDEA S College of Engineering,Manjari
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Advanced Features for Enterprise-Wide Role-Based Access Control
Advanced Features for Enterprise-Wide -Based Access Control Axel Kern Systor Security Solutions GmbH Hermann-Heinrich-Gossen-Str. 3 50858 Köln, Germany [email protected] Abstract The administration
AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
PartJoin: An Efficient Storage and Query Execution for Data Warehouses
PartJoin: An Efficient Storage and Query Execution for Data Warehouses Ladjel Bellatreche 1, Michel Schneider 2, Mukesh Mohania 3, and Bharat Bhargava 4 1 IMERIR, Perpignan, FRANCE [email protected] 2
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems Na Zhao 1, Min Chen 2, Shu-Ching Chen 1, Mei-Ling Shyu 3 1 Distributed Multimedia Information System Laboratory
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: [email protected]
Proposed NIST Standard for Role-Based Access Control
Proposed NIST Standard for Role-Based Access Control DAVID F. FERRAIOLO National Institute of Standards and Technology RAVI SANDHU SingleSign On. Net and George Mason University, [email protected] or www.list.gmu.edu
Comparing Simple Role Based Access Control Models and Access Control Lists. Abstract. 1 Introduction
Comparing Simple Role Based Access Control Models and Access Control Lists John Barkley National Institute of Standards and Technology Gait hersburg MD 20899 (301) 975-3346 j barkleyanist.gov Abstract
Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules
Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules M.Sangeetha 1, P. Anishprabu 2, S. Shanmathi 3 Department of Computer Science and Engineering SriGuru Institute of Technology
Attribute-Based Access Control. Stephen Schwab and Jay Jacobs. SPARTA ISSO Security Research Division (d.b.a. Cobham Analytic Solutions)
March 18, 2010 Attribute-Based Access Control Stephen Schwab and Jay Jacobs SPARTA ISSO Security Research Division (d.b.a. Cobham Analytic Solutions) Topics ABAC Usage and Features RT 0 Credentials Delegation
Research of Smart Space based on Business Intelligence
Research of Smart Space based on Business Intelligence 1 Jia-yi YAO, 2 Tian-tian MA 1 School of Economics and Management, Beijing Jiaotong University, [email protected] 2 School of Economics and Management,
Prediction of Heart Disease Using Naïve Bayes Algorithm
Prediction of Heart Disease Using Naïve Bayes Algorithm R.Karthiyayini 1, S.Chithaara 2 Assistant Professor, Department of computer Applications, Anna University, BIT campus, Tiruchirapalli, Tamilnadu,
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2
Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2 Abubakar Sulaiman Gezawa 1, Ahmed Aliyu 2, Tong Yujun 3, Saifullahi Aminu Bello 4, Abubakar Ado 5 System
Automatic Annotation Wrapper Generation and Mining Web Database Search Result
Automatic Annotation Wrapper Generation and Mining Web Database Search Result V.Yogam 1, K.Umamaheswari 2 1 PG student, ME Software Engineering, Anna University (BIT campus), Trichy, Tamil nadu, India
Research and Practice of DataRBAC-based Big Data Privacy Protection
Send Orders for Reprints to [email protected] The Open Cybernetics & Systemics Journal, 2015, 9, 669-673 669 Open Access Research and Practice of DataRBAC-based Big Data Privacy Protection Huang
Clustering Data Streams
Clustering Data Streams Mohamed Elasmar Prashant Thiruvengadachari Javier Salinas Martin [email protected] [email protected] [email protected] Introduction: Data mining is the science of extracting
Keywords: Regression testing, database applications, and impact analysis. Abstract. 1 Introduction
Regression Testing of Database Applications Bassel Daou, Ramzi A. Haraty, Nash at Mansour Lebanese American University P.O. Box 13-5053 Beirut, Lebanon Email: rharaty, [email protected] Keywords: Regression
A QoS-Aware Web Service Selection Based on Clustering
International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,
Incorporating database systems into a secure software development methodology
Incorporating database systems into a secure software development methodology Eduardo B. Fernandez 1, Jan Jurjens 2, Nobukazu Yoshioka 3, and Hironori Washizaki 4 1 Dept. of Computer Science, Florida Atlantic
1. Introduction. 2. Background. 2.1. Cloud computing in a nutshell
Title: Towards new access control models for Cloud computing systems Category: 'In the Cloud' - Security Author name: Gouglidis Antonios City, Country: Thessaloniki, Greece Year of study, Course Title:
Secrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
Workflow Access Control from a Business Perspective
Workflow Access Control from a Business Perspective Dulce Domingos, António Rito-Silva 2, Pedro Veiga Informatics Department, University of Lisbon, Faculty of Sciences {dulce, pmv}@di.fc.ul.pt 2 INESC-ID
Survey on Load Rebalancing for Distributed File System in Cloud
Survey on Load Rebalancing for Distributed File System in Cloud Prof. Pranalini S. Ketkar Ankita Bhimrao Patkure IT Department, DCOER, PG Scholar, Computer Department DCOER, Pune University Pune university
International Journal of Engineering Technology, Management and Applied Sciences. www.ijetmas.com November 2014, Volume 2 Issue 6, ISSN 2349-4476
ERP SYSYTEM Nitika Jain 1 Niriksha 2 1 Student, RKGITW 2 Student, RKGITW Uttar Pradesh Tech. University Uttar Pradesh Tech. University Ghaziabad, U.P., India Ghaziabad, U.P., India ABSTRACT Student ERP
ISSN 2348 2370 Vol.06,Issue.04, June-2014, Pages:276-280. www.semargroup.org
ISSN 2348 2370 Vol.06,Issue.04, June-2014, Pages:276-280 www.semargroup.org Firewall Policy Anomaly Detection and Resolution R.V.DARADE 1, PROF.P.B.KUMBHARKAR 2 1 Dept of Computer Engineering, SCOE, Sudumbare,
A methodology for secure software design
A methodology for secure software design Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca Raton, FL 33431 [email protected] 1. Introduction A good percentage of the
