Search results for "Access control"

showing 10 items of 79 documents

Attribute based access control scheme with controlled access delegation for collaborative E-health environments

2017

Abstract Modern electronic healthcare (e-health) settings constitute collaborative environments with complex access requirements. Thus, there is a need for sophisticated fine-grained access control mechanisms to cater these access demands and thereby experience the full potential of e-health systems. In order to realize a flexible access control scheme, integrating access delegation is of paramount importance. However, access delegation has to be enforced in a controlled manner so that it will not jeopardize the security of the system. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities. …

Scheme (programming language)Computer access controlDelegationRevocationComputer Networks and CommunicationsComputer sciencebusiness.industrymedia_common.quotation_subject020206 networking & telecommunications020207 software engineeringProvisioningAccess control02 engineering and technologyComputer securitycomputer.software_genre0202 electrical engineering electronic engineering information engineeringPhysical accessRole-based access controlSafety Risk Reliability and QualitybusinesscomputerSoftwaremedia_commoncomputer.programming_languageJournal of Information Security and Applications
researchProduct

Blockchain Based Delegatable Access Control Scheme for a Collaborative E-Health Environment

2018

Modern electronic healthcare (e-health) settings constitute collaborative environments requiring sophisticated fine-grained access control mechanisms to cater their access demands. Access delegatability is quite crucial to realize fine-grained, flexible access control schemes compatible with such environments. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities suitable for a multi-domain e-health environment. We have utilized the blockchain technology to manage attribute assignments, delegations as well as revocations. The scheme enables delegations in a controlled manner without jeopard…

Scheme (programming language)DelegationRevocationbusiness.industryComputer sciencemedia_common.quotation_subject010401 analytical chemistryControl (management)Overhead (engineering)020206 networking & telecommunicationsAccess control02 engineering and technologyAttribute-based access controlComputer securitycomputer.software_genre01 natural sciences0104 chemical sciences0202 electrical engineering electronic engineering information engineeringInformationSystems_MISCELLANEOUSbusinessKey managementcomputermedia_commoncomputer.programming_language2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
researchProduct

An attribute based access control scheme for secure sharing of electronic health records

2016

Electronic health records (EHRs) play a vital role in modern health industry, allowing the possibility of flexible sharing of health information in the quest of provisioning advanced and efficient healthcare services for the users. Although sharing of EHRs has significant benefits, given that such records contain lot of sensitive information, secure sharing of EHRs is of paramount importance. Thus, there is a need for the realization of sophisticated access control mechanisms for secure sharing of EHRs, which has attracted significant interest from the research community. The most prominent access control schemes for sharing of EHRs found in literature are role based and such solutions have…

Scheme (programming language)business.industryComputer scienceInternet privacy020206 networking & telecommunications020207 software engineeringProvisioningAccess control02 engineering and technologyComputer securitycomputer.software_genreInformation sensitivityResource (project management)Health care0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDSOCIETYbusinesscomputerSelective disclosurecomputer.programming_languageDrawback2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)
researchProduct

Analysis and Simulation of the Signaling Protocols for the DiffServ Framework

2006

This paper considers signaling protocols for the DiffServ QoS framework. Originally, DiffServ had no standardized signaling solution, which resulted in the static configuration for the DiffServ domain. However, the dynamic allocation of resources within the domain allows to ensure the per-flow QoS guarantees and achieve better performance. At the moment, several signaling solutions for DiffServ framework are available. Thus, it is crucial to analyse these solutions and interconnections between them. In particular, the RSVP, aggregated RSVP, GIST, COPS, and SIP protocols will be considered. The simulation comprises several scenarios that present that the dynamic allocation of resource within…

Session Initiation Protocolbusiness.industryComputer sciencecomputer.internet_protocolQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSAccess controlDomain (software engineering)Signaling protocolCore routerResource allocationResource managementbusinesscomputerComputer network
researchProduct

An extended JADE-S based framework for developing secure Multi-Agent Systems

2009

Agent communities are self-organized virtual spaces consisting of a large number of agents and their dynamic environments. Within a community, agents group together offering special e-services for effective, reliable, and mutual benefits. Usually, an agent community is composed of specialized agents performing one or more tasks in a single domain/sub-domain, or in highly intersecting domains. However, secure Multi- Agent Systems require severe mechanisms in order to prevent malicious attacks. Several limits affect exiting secure agents platform, such as the lack of a strong authentication system, the lack of a flexible distributed mechanism for access control and the lack of a system for st…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniService (systems architecture)AuthenticationPublic key certificateComputer sciencebusiness.industryMulti-agent systemmedia_common.quotation_subjectJADE (programming language)Access controlMulti-Agent Systems Security Biometric Authentication SystemsComputer securitycomputer.software_genreHardware and ArchitectureStrong authenticationbusinessLawcomputerSoftwareComputer networkReputationmedia_commoncomputer.programming_languageComputer Standards & Interfaces
researchProduct

Mobile Security with Location-Aware Role-Based Access Control

2012

Published version of an article from the book: Security and privacy in mobile information and communication systems. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-30244-2_15 This paper describes how location-aware Role-Based Access Control (RBAC) can be implemented on top of the Geographically eXtensible Access Control Markup Language (GeoXACML). It furthermore sketches how spatial separation of duty constraints (both static and dynamic) can be implemented using GeoXACML on top of the XACML RBAC profile. The solution uses physical addressing of geographical locations which facilitates easy deployment of authorisation profiles to the mobile device. Location-aware RBAC c…

Software_OPERATINGSYSTEMSMarkup languagebusiness.industryComputer scienceSeparation of dutiesXACMLComputerApplications_COMPUTERSINOTHERSYSTEMSAccess controlComputer securitycomputer.software_genreFirewall (construction)Software deploymentVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Role-based access controlbusinesscomputerMobile deviceComputer networkcomputer.programming_language
researchProduct

ViSPE: A Graphical Policy Editor for XACML

2015

In this paper we present the Visual Security Policy Editor (ViSPE), a policy-maker-friendly graphical editor for the eXtensible Access Control Markup Language (XACML). The editor is based on the programming language Scratch and implemented in Smalltalk. It uses a graphical block-based syntax for declaring access control polices that simplifies many of the cumbersome and verbose parts of XACML. Using a graphical language allows the editor to aid the policy-maker in building polices by providing visual feedback and by grouping blocks and operators that fit together and also indicating which blocks that stick together. It simplifies building policies while still maintaining the basic structure…

Structure (mathematical logic)Markup languageSyntax (programming languages)Computer sciencebusiness.industryProgramming languageXACMLAccess controlSecurity policycomputer.software_genreBlock (programming)businesscomputerSmalltalkcomputer.programming_language
researchProduct

IoT-MAAC: Multiple Attribute Access Control for IoT environments

2020

Access Control is an important security service that should be considered in IoT environments in order to offer reliable IoT services. Access control in IoT environments concerns not only the access of IoT users to IoT services and objects, but also the access of IoT objects to IoT gateways. In this paper, we specify an access control mechanism that considers the access of IoT objects to IoT gateways in order to enhance the reliability of IoT data provided by the IoT objects. Our proposed access control mechanism, called IoT-MAAC (Multi Attribute Access Control), allows retrieving requested data from the most reliable and secured IoT objects among the available objects in the IoT environmen…

Trust levelService Level Agreements[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Computer sciencebusiness.industryReliability (computer networking)Access ControlIoT environments020206 networking & telecommunicationsAccess control02 engineering and technology[INFO] Computer Science [cs]Security service0202 electrical engineering electronic engineering information engineeringSecurity020201 artificial intelligence & image processingInternet of ThingsbusinessComputer networkMultiple attribute
researchProduct

MAClets: Active MAC Protocols over hard-coded devices

2012

We introduce MAClets, software programs uploaded and executed on-demand over wireless cards, and devised to change the card's real-time medium access control operation. MAClets permit seamless reconfiguration of the MAC stack, so as to adapt it to mutated context and spectrum conditions and perform tailored performance optimizations hardly accountable by an once-for-all protocol stack design. Following traditional active networking principles, MAClets can be directly conveyed within data packets and executed on hard-coded devices acting as virtual MAC machines. Indeed, rather than executing a pre-defined protocol, we envision a new architecture for wireless cards based on a protocol interpr…

WLAN 802.11business.industryComputer scienceNetwork packetSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSNetwork virtualizationControl reconfigurationAccess controlProtocol stackSoftware portabilityprogrammable MACEmbedded systemcognitive radiobusinessProtocol (object-oriented programming)reconfigurabilityActive networkingComputer network
researchProduct

Improving the quality of e-commerce web service: what is important for the request scheduling algorithm?

2005

The paper concerns a new research area that is Quality of Web Service (QoWS). The need for QoWS is motivated by a still growing number of Internet users, by a steady development and diversification of Web services, and especially by popularization of e-commerce applications. The goal of the paper is a critical analysis of the literature concerning scheduling algorithms for e-commerce Web servers. The paper characterizes factors affecting the load of the Web servers and discusses ways of improving their efficiency. Crucial QoWS requirements of the business Web server are identified: serving requests before their individual deadlines, supporting user session integrity, supporting different cl…

Web servermedicine.medical_specialtyService qualitybusiness.industryComputer scienceAccess controlE-commercecomputer.software_genreWorld Wide WebServermedicineThe InternetWeb servicebusinesscomputerWeb modelingSPIE Proceedings
researchProduct