Search results for "Access control"

showing 10 items of 79 documents

Constraints validation in privacy-preserving attribute-based access control

2015

Attribute-Based Access Control (ABAC) has been found to be extremely useful and flexible and has drawn a lot of research in recent years. It was observed that in the context of new emerging applications, attributes play an increasingly important role both in defining and enforcing more elaborated and flexible security policies. Recently, NIST has proposed more formal definition of ABAC. In this paper we discuss a general privacy-preserving ABAC model (which combines both authentication and authorization) and propose an approach to handle constraints in such privacy preserving setting.

Information privacyAuthenticationComputer access controlComputer sciencebusiness.industryContext (language use)Access controlSecurity policyComputer securitycomputer.software_genrePrivacy preservingNISTbusinesscomputer2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
researchProduct

Security and privacy in the Internet of Things: Current status and open issues

2014

The Internet of Things at large will foster billions of devices, people and services to interconnect and exchange information and useful data. As IoT systems will be ubiquitous and pervasive, a number of security and privacy issues will arise. Credible, economical, efficient and effective security and privacy for IoT are required to ensure exact and accurate confidentiality, integrity, authentication, and access control, among others. In this paper, the IoT vision, existing security threats, and open challenges in the domain of IoT are discussed. The current state of research on IoT security requirements is discussed and future research directions with respect to IoT security and privacy ar…

Information privacyCloud computing securityPrivacy by DesignComputer sciencePrivacy softwarebusiness.industryInternet privacyData securityAccess controlComputer securitycomputer.software_genreInternet securitybusinessPersonally identifiable informationcomputer2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)
researchProduct

A Survey on Privacy in Decentralized Online Social Networks

2018

Decentralized Online Social Networks (DOSNs) have recently captured the interest of users because of the more control given to them over their shared contents. Indeed, most of the user privacy issues related to the centralized Online Social Network (OSN) services (such as Facebook or Google+) do not apply in the case of DOSNs because of the absence of the centralized service provider. However, these new architectures have motivated researchers to investigate new privacy solutions that allow DOSN’s users to protect their contents by taking into account the decentralized nature of the DOSNs platform. In this survey, we provide a comprehensive overview of the privacy solutions adopted by…

Information privacyData privacy; Decentralized online social network; Access control; Security; Peer to peer computingGeneral Computer ScienceSocial networkbusiness.industryComputer sciencePrivacy policyControl (management)Internet privacyComputer Science (all)020206 networking & telecommunicationsAccess controlPeer to peer computing02 engineering and technologyService providerTheoretical Computer ScienceOverhead (business)0202 electrical engineering electronic engineering information engineeringSecurityDecentralized online social network020201 artificial intelligence & image processingAccess controlEnforcementbusinessData privacy
researchProduct

To Share or Not to Share: Supporting the User Decision in Mobile Social Software Applications

2007

User's privacy concerns represent one of the most serious obstacles to the wide adoption of mobile social software applications. In this paper, we introduce a conceptual model which tackles the problem from the perspective of trade-off between privacy and trust, where the user takes the decision with minimal privacy loss. To support the user decision, we introduce the Mobile Access Control List (Macl), a privacy management mechanism which takes into account the user attitude towards mobile sharing, his communication history and social network relationships.

Information privacySocial networkPrivacy by Designbusiness.industryPrivacy softwareComputer scienceInternet privacySocial softwareMobile computingConceptual model (computer science)computer.software_genreWorld Wide WebbusinesscomputerAccess control list
researchProduct

Trust-enhanced intelligent security model

2012

In this paper we propose a trust-enhancement of access control to protect both integrity and confidentiality based on trustworthiness of users performing operations and documents' content analysis. We propose to utilize trustworthiness opinions from subjective logic and express levels of integrity as levels of trustworthiness. We assign confidentiality levels based on contents of documents and use opinions to express trustworthiness of such assignments.

Information privacybusiness.industryComputer scienceInternet privacyAccess controlComputer security modelComputer securitycomputer.software_genreContent analysisSoftware agentData_GENERALData integrityConfidentialitybusinessSubjective logiccomputer2012 6th IEEE INTERNATIONAL CONFERENCE INTELLIGENT SYSTEMS
researchProduct

An Experimental Testbed and Methodology for Characterizing IEEE 802.11 Network Cards

2006

It has been observed that IEEE 802.11 commercial cards produced by different vendors show a different behavior in terms of perceived throughput or access delay. Performance differences are evident both when the cards contend alone to the channel, and when heterogeneous cards contend together. Since the performance misalignment does not disappear by averaging the environmental factors (such as propagation conditions, laptop models, traffic generators, etc), it is evident that the well known throughput-fairness property of the DCF protocol is not guaranteed in actual networks. In this paper we propose a methodological approach devised to experimentally characterize the IEEE 802.11 commercial …

Inter-Access Point ProtocolComputer sciencebusiness.industryReal-time computingWireless local area networks (WLAN)Network allocation vectorThroughputbackoff algorithmIEEE 802.11Network interface controllerMedia access controlIEEE 802.11e-2005IEEE 802.1XbusinessThroughput (business)Computer network
researchProduct

Lecture Notes in Real-Time Intelligent Systems

2018

Intelligent computing refers greatly to artificial intelligence with the aim at making computer to act as a human. This newly developed area of real-time intelligent computing integrates the aspect of dynamic environments with the human intelligence. This book presents a comprehensive practical and easy to read account which describes current state-of-the art in designing and implementing real-time intelligent computing to robotics, alert systems, IoT, remote access control, multi-agent systems, networking, mobile smart systems, crowd sourcing, broadband systems, cloud computing, streaming data and many other applications areas. The solutions discussed in this book will encourage the resear…

IoTMultimediaComputer scienceRemote Access ControlIntelligent decision support systemStreaming DataCloud Computingcomputer.software_genreIntelligent SystemsMulti-agent SystemsNetworkingMobile Smart SystemsCrowdsourcingcomputerBroadband Systems
researchProduct

Access Control Model for Cooperative Healthcare Environments: Modeling and Verification

2016

Integrated use of electronic health records (EHRs) seem both promising and necessary in improving the quality and delivery of health services. This allows healthcare providers access to information they require to provide rapid patient care. Of course, when sensitive information is shared among a group of people within or across organizations, enforceable security and privacy control over the information flow is a key aspect. In this study, an access control model for cooperative healthcare environments is presented. A work-based access control (WBAC) model is proposed by introducing the concept of team role and modifying the user-role assignment model from previous work. Verification indic…

Knowledge managementComputer sciencebusiness.industrymedia_common.quotation_subjectControl (management)Access control02 engineering and technologyInformation sensitivityWork (electrical)020204 information systemsHealth care0202 electrical engineering electronic engineering information engineeringKey (cryptography)020201 artificial intelligence & image processingQuality (business)Information flow (information theory)businessmedia_common2016 IEEE International Conference on Healthcare Informatics (ICHI)
researchProduct

Towards an Access Control Model for Collaborative Healthcare Systems

2016

In this study, an access control model for collaborative healthcare systems is proposed. Collaboration requirements, patient data confidentiality and the need for flexible access for healthcare providers through the actual work they must fulfill as part of their duties are carefully addressed. The main goal is to provide an access control model that strikes a balance between collaboration and safeguarding sensitive patient information.

Knowledge managementWork (electrical)business.industryComputer sciencePatient informationAccess controlConfidentialityPatient dataSafeguardingbusinessHealthcare providersHealthcare systemProceedings of the 9th International Joint Conference on Biomedical Engineering Systems and Technologies
researchProduct

Collision Avoidance in Wake-Up Radio Enabled WSNs: Protocol and Performance Evaluation

2018

In wake-up radio (WuR) enabled wireless sensor networks (WSNs), the envisaged application scenarios are primarily targeted at low traffic load conditions. When applying WuR to medium or heavy traffic load scenarios, however, collisions among wake-up calls (WuCs) may happen, resulting in a lower packet delivery ratio (PDR). In this paper, we propose a media access control protocol for WuR- enabled WSN that is capable of avoiding WuC collisions by activating a contention-based collision avoidance mechanism for WuC transmissions. The performance of the proposed protocol is evaluated by a Markov chain based mathematical model and is compared with a WuR protocol that performs only clear channel as…

Markov chainNetwork packetComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryMarkov process020206 networking & telecommunicationsThroughput02 engineering and technologyWake01 natural sciences0104 chemical sciencessymbols.namesake0202 electrical engineering electronic engineering information engineeringMedia access controlsymbolsbusinessWireless sensor networkProtocol (object-oriented programming)Collision avoidanceComputer network2018 IEEE International Conference on Communications (ICC)
researchProduct