An Access Control Method considering Semantic Context for Privacy-preserving
Journal: The Journal of the Institute of Internet, Broadcasting and Communication (Vol.15, No. 1)Publication Date: 2015-02-28
Authors : Woo-Jun Kang;
Page : 1-14
Keywords : Context-awareness; Access Control; Security Constraints; Policy Hierarchy;
Abstract
To conform to new emerging computing paradigm, various researches and challenges are being done. New information technologies make easy to access and acquire information in various ways. In other side, however, it also makes illegal access more powerful and various threat to system security. In this paper, we suggest a new extended access control method that make it possible to conform to security policies enforcement even with discrepancy between policy based constraints rules and query based constraints rules, based on their semantic information. New method is to derive security policy rules using context tree structure and to control the exceed granting of privileges through the degree of the semantic discrepancy. In addition, we illustrate prototype system architecture and make performance comparison with existing access control methods.
Other Latest Articles
- A Systematic Review Of The Use Of Bupropion For Hypoactive Sexual Desire Disorder In Premenopausal Women
- TANTANGAN PEWIRAUSAHA DI BIDANG TI: BAGAIMANA MENGHASILKAN KEUNTUNGAN DARI IDE? STUDI KASUS PADA PT “IPS” (PAYMENT GATEWAY)
- Below What Hemoglobin Concentration In Pregnancy Is There An Increased Risk Of Maternal Or Fetal Adverse Effects?
- OPTIMASI JARINGAN DENGAN SPANNING TREE UNTUK CONGESTION MANAGEMENT
- What Are The Risk Factors For ?4500 G Macrosomia?
Last modified: 2015-11-18 16:11:52