Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
A novel Access Control Model Based on the Structure of Applications.
Author(s):
1. Afshin Rezakhani: Information, communications and security technologies Complex, Malek-Ashtar University of Technology, Tehran, Iran
2. Hossein Shirazi: Information, communications and security technologies Complex, Malek-Ashtar University of Technology, Tehran, Iran
3. Naser Modiri: Department of Computer Engineering, Islamic Azad University, Zanjan Branch, Iran
Abstract:
Nowadays, access control has an important role in the management of access to resources in the networks and applications. The establishment of access control in applications is important particularly. Traditional methods of access control, manage the users' access only at data-centric level. In this paper a new model is presented in which the access control in applications is performed not only at data-centric level but also at component and plug-in levels. By applying the proposed model, the execution of plug-ins or components will be authorized only in the case of enrollment process and in the necessary authorities. In addition, users can access to plug-ins and components only in the case of gaining the necessary authorities. By using the proposed model, the access control can be applied based on both operational needs and applications capabilities accurately.
Page(s): 93-100
DOI: DOI not available
Published: Journal: International Journal of Communication Networks and Information Security, Volume: 8, Issue: 2, Year: 2016
Keywords:
Keywords are not available for this article.
References:
[1] Rashidi , A.J,Rezakhani , A., 2016.“A new approach to ranking attributes in attribute based access control using decision fusion”,Neural Computing and Applications 1 -10
[2] Nakhjiri , M,Nakhjiri , M., 2005.AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility”, -
[3] Bertino , E,G,A., 2011.Access Control for Databases: Concepts and Systems”, 3 1 -148
[4] Sansorg., 2016.,Sansorg. Retrieved 17 June -
[5] Habiba, 2016.“A New Approach to Access Control in Cloud”,Arabian Journal for Science and Engineering 41 1015 -1030
[6] Armando , A., 2015.Balancing Trust and Risk in Access Control”,On the Move to Meaningful Internet Systems: OTM 2015 Conferences 660 -676
[7] Voon , M.J., 2016.Campus Access Control and Management System”,Intelligent and Evolutionary Systems 395 -404
[8] Rajpoot , Q.M., 2015.Attributes Enhanced Role-Based Access Control Model”,Trust, Privacy and Security in Digital Business 3 -17
[9] Penubaku , L., 2015.“Access Control System Which Uses Human Behavioral Profiling for Authentication”,Advances in Signal Processing and Intelligent Recognition Systems 419 -430
[10] Gupta , N,A & Tripathi,R., 2015.Medium access control protocols for safety applications in Vehicular Ad-Hoc Network: A classification and comprehensive survey”,Vehicular Communications 2 223 -237
[11] Chu, 2015.“Application of reinforcement learning to medium access control for wireless sensor networks”,Engineering Applications of Artificial Intelligence 49 23 -32
[12] Li, 2015.Robust access control framework for mobile cloud computing network”,Computer Communications 68 61 -72
[13] Majumder , A.,Mahmood, 2014.Taxonomy and Classification of Access Control Models for Cloud Environments”,Continued Rise of the Cloud 23 -53
[14] Aluvalu , R., 2015.A Survey on Access Control Models in Cloud Computing”,Emerging ICT for Bridging the Future - Proceedings of the 49th Annual 1 2 3 4 5 Convention of the Computer Society of India 653 -664
[15] 2003.Secretariat information technology industry council (iti),, “Role Based Access Control”. : American National Standard for Information Technology (NIST) -
[16] Sharma et al., AMTRAC:, 2013.An administrative model for temporal role-based access control,Computers & Security 39 201 -218
[17] Chen , L.,C & Fernandez-gago, 2012.Risk-Aware Role-Based Access Control”,Security and Trust Management 140 -156
[18] Salim, 2013.,Budget-aware Role Based Access Control. Computers & Security 35 37 -50
[19] VincentC.,Hu, 2014.Guide to Attribute Based Access Control (ABAC) Definition and Considerations”,USA: NIST Special Publication 800-162 -
[20] Smari , W,P,J., 2014.An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system,Future Generation Computer Systems” 31 147 -168
[21] Almutairi , A,M & Ghafoor,A., 2015.Risk-Aware Management of Virtual Resources in Access Controlled Service-oriented Cloud Datacenters”,PP(99) -
[22] Wu , J., 2005.Authorization-authentication using XACML and SAML”, -
[23] Isoorg, 2016.,htm?csnumber=1819 9 -
[24] Zhou , L,H,J., 2013.Continuous Ordered Weighted Distance Measure and Its Application to Multiple Attribute Group Decision Making”,Group Decision and Negotiation 22 739 -758
Citations
Citations are not available for this document.
0

Citations

0

Downloads

18

Views