scholarly journals Secure Set-Based Policy Checking and Its Application to Password Registration

Author(s):  
Changyu Dong ◽  
Franziskus Kiefer
Keyword(s):  
2021 ◽  
Vol 10 (5) ◽  
pp. 2537-2548
Author(s):  
K.R. Kumar ◽  
E.N. Satheesh

An eternal $1$-secure set, in a graph $G = (V, E)$ is a set $D \subset V$ having the property that for any finite sequence of vertices $r_1, r_2, \ldots, r_k$ there exists a sequence of vertices $v_1, v_2, \ldots, v_k$ and a sequence $ D = D_0, D_1, D_2, \ldots, D_k$ of dominating sets of $G$, such that for each $i$, $1 \leq i \leq k$, $D_{i} = (D_{i-1} - \{v_i\}) \cup \{r_i\}$, where $v_i \in D_{i-1}$ and $r_i \in N[v_i]$. Here $r_i = v_i$ is possible. The cardinality of the smallest eternal $1$-secure set in a graph $G$ is called the eternal $1$-security number of $G$. In this paper we study a variations of eternal $1$-secure sets named safe eternal $1$-secure sets. A vertex $v$ is safe with respect to an eternal $1$-secure set $S$ if $N[v] \bigcap S =1$. An eternal 1 secure set $S$ is a safe eternal 1 secure set if at least one vertex in $G$ is safe with respect to the set $S$. We characterize the class of graphs having safe eternal $1$-secure sets for which all vertices - excluding those in the safe $1$-secure sets - are safe. Also we introduce a new kind of directed graphs which represent the transformation from one safe 1 - secure set to another safe 1-secure set of a given graph and study its properties.


2015 ◽  
Vol 59 (5) ◽  
pp. 616-629
Author(s):  
Jia-Jie Liu ◽  
Cheng-Ju Hsu ◽  
Chien-Hung Lin
Keyword(s):  

2016 ◽  
Vol 2016 (3) ◽  
pp. 4-23 ◽  
Author(s):  
Rinku Dewri ◽  
Toan Ong ◽  
Ramakrishna Thurimella

Abstract A federated query portal in an electronic health record infrastructure enables large epidemiology studies by combining data from geographically dispersed medical institutions. However, an individual’s health record has been found to be distributed across multiple carrier databases in local settings. Privacy regulations may prohibit a data source from revealing clear text identifiers, thereby making it non-trivial for a query aggregator to determine which records correspond to the same underlying individual. In this paper, we explore this problem of privately detecting and tracking the health records of an individual in a distributed infrastructure. We begin with a secure set intersection protocol based on commutative encryption, and show how to make it practical on comparison spaces as large as 1010 pairs. Using bigram matching, precomputed tables, and data parallelism, we successfully reduced the execution time to a matter of minutes, while retaining a high degree of accuracy even in records with data entry errors. We also propose techniques to prevent the inference of identifier information when knowledge of underlying data distributions is known to an adversary. Finally, we discuss how records can be tracked utilizing the detection results during query processing.


Throughout this paper, consider G = (V,E) as a connected graph. A subset D of V(G) is a set dominating set of G if for every M  V / D there exists a non-empty set N of D such that the induced sub graph <MUN> is connected. A subset D of the vertex set of a graph G is called a co-secure dominating set of a graph if D is a dominating set, and for each u' D there exists a vertex v'V / D such that u'v' is an edge and D \u'v' is a dominating set. A co-secure dominating set D is a co-secure set dominating set of G if D is also a set dominating set of G. The co-secure set domination number G s cs γ is the minimum cardinality of a co-secure set dominating set. In this paper we initiate the study of this new parameter & also determine the co-secure set domination number of some standard graphs and obtain its bounds.


Author(s):  
NIRMALA C. G ◽  
HEMALATHA. N

Anonymous secure group communication is a new research and application paradigm. In this paper Anonymity between two-party communication, Access control polynomial to multi-part group communication, group key management for secure group communication and secure set concepts has been proposed. Newly extended scheme enforces Anonymous group membership, group size, Anonymous group communication and group message broadcasting. The experimental results and comparisons with existing system show that the ACP scheme is elegant, flexible, efficient and practical.


Sign in / Sign up

Export Citation Format

Share Document