scholarly journals An Efficient Access Control Model for Mobile Ad-Hoc Communities

Author(s):  
Sye Loong Keoh ◽  
Emil Lupu
2014 ◽  
Vol 20 (10) ◽  
pp. 2046-2049 ◽  
Author(s):  
Asmidar Abu Bakar ◽  
El-Munzir Hassan El-Talib ◽  
Roslan Ismail

2016 ◽  
pp. 1756-1773
Author(s):  
Grzegorz Spyra ◽  
William J. Buchanan ◽  
Peter Cruickshank ◽  
Elias Ekonomou

This paper proposes a new identity, and its underlying meta-data, model. The approach enables secure spanning of identity meta-data across many boundaries such as health-care, financial and educational institutions, including all others that store and process sensitive personal data. It introduces the new concepts of Compound Personal Record (CPR) and Compound Identifiable Data (CID) ontology, which aim to move toward own your own data model. The CID model ensures authenticity of identity meta-data; high availability via unified Cloud-hosted XML data structure; and privacy through encryption, obfuscation and anonymity applied to Ontology-based XML distributed content. Additionally CID via XML ontologies is enabled for identity federation. The paper also suggests that access over sensitive data should be strictly governed through an access control model with granular policy enforcement on the service side. This includes the involvement of relevant access control model entities, which are enabled to authorize an ad-hoc break-glass data access, which should give high accountability for data access attempts.


2007 ◽  
Vol 10-12 ◽  
pp. 767-771
Author(s):  
Zhao Liang Jiang ◽  
Shi Hong Feng ◽  
M.F. Qi ◽  
Zhao Qian Li

In order to protect ERP system information from authorized users or non- trusted users, a trusted role based access control model was proposed. Combined with the characteristics of enterprises, trusted computation for user is designed to support roles assignment to the users. Meanwhile, Object Lifecycle States (OLSs) are presented for efficient access control to objects. Based on the value of trusted computation, users are assigned the corresponding roles to access control various resources. Finally, there is an empirical research on an ERP System implemented in a manufacturing enterprise.


Sign in / Sign up

Export Citation Format

Share Document