scholarly journals Controlling the Dependency of User Access Control Mechanisms on Correctness of User Identification

1988 ◽  
Vol 31 (6) ◽  
pp. 503-509 ◽  
Author(s):  
G. O'Shea
2021 ◽  
Vol 54 (3) ◽  
pp. 1-35
Author(s):  
Boubakr Nour ◽  
Hakima Khelifi ◽  
Rasheed Hussain ◽  
Spyridon Mastorakis ◽  
Hassine Moungla

Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean-slate approach for Internet communication. NDN provides intrinsic content security where security is directly provided to the content instead of communication channel. Among other security aspects, Access Control (AC) rules specify the privileges for the entities that can access the content. In TCP/IP-based AC systems, due to the client-server communication model, the servers control which client can access a particular content. In contrast, ICN-based networks use content names to drive communication and decouple the content from its original location. This phenomenon leads to the loss of control over the content, causing different challenges for the realization of efficient AC mechanisms. To date, considerable efforts have been made to develop various AC mechanisms in NDN. In this article, we provide a detailed and comprehensive survey of the AC mechanisms in NDN. We follow a holistic approach towards AC in NDN where we first summarize the ICN paradigm, describe the changes from channel-based security to content-based security, and highlight different cryptographic algorithms and security protocols in NDN. We then classify the existing AC mechanisms into two main categories: Encryption-based AC and Encryption-independent AC . Each category has different classes based on the working principle of AC (e.g., Attribute-based AC, Name-based AC, Identity-based AC). Finally, we present the lessons learned from the existing AC mechanisms and identify the challenges of NDN-based AC at large, highlighting future research directions for the community.


2019 ◽  
Vol 15 (2) ◽  
pp. 23-28
Author(s):  
Evgeny A. Godovnikov ◽  
Anatoliy V. Shicelov ◽  
Ruslan T. Usmanov

This article discusses the design of a physical access control system for an enterprise with various methods of authentication and user identification. A review of existing solutions in the design of physical access control systems was conducted. In the course of the work, a system design was proposed, and its components were described in detail.


2021 ◽  
Author(s):  
László Viktor Jánoky ◽  
Péter Ekler ◽  
János Levendovszky

JSON Web Tokens (JWT) provide a scalable, distributed way of user access control for modern web-based systems. The main advantage of the scheme is that the tokens are valid by themselves – through the use of digital signing – also imply its greatest weakness. Once issued, there is no trivial way to revoke a JWT token. In our work, we present a novel approach for this revocation problem, overcoming some of the problems of currently used solutions. To compare our solution to the established solutions, we also introduce the mathematical framework of comparison, which we ultimately test using real-world measurements.


Author(s):  
С.В. Шевелев ◽  
А.Б. Семенов

Рассмотрены принципы обеспечения заданного уровня качества обслуживания QoS в беспроводных сетях, позволяющие достигнуть устойчивого функционирования программных приложений реального времени за счет тонкой настройки приоритезации генерируемого ими трафика. Основное внимание уделяется механизму управления доступом на основе конкуренции и контролируемого доступа, а также их расширениям. Затронуты вопросы инкапсуляции базовых механизмов управления в решения более высоких уровней EDCA и TXOP. Приведены расчетные значения соответствующих параметров. The principles of ensuring a given level of quality of QoS service in wireless networks are considered, which allow achieving the stable functioning of real-time software applications by fine-tuning the prioritization of the traffic generated by them. The main focus is on the competition-based access control mechanism and controlled access, as well as their extensions. The issues of encapsulation of basic control mechanisms in solutions of higher levels of EDCA and TXOP are touched upon. The calculated values of the corresponding parameters are given.


Author(s):  
Sérgio Luís Guerreiro

When organizations are collaborating, their access control models need to interoperate. However, nowadays in the industry, there are too many access control models variants and, most of times; the interoperability enforcement consumes an extra effort. In this context, this paper identifies the challenges towards how to design and enforce a meta-access control model to facilitate the interoperability between the different access control mechanisms available. The problem is posed using an ontological approach. Then, the challenges are explained using a descriptive explanation of the meta access control enforcement. The core issues addressed are: access models interoperability, standardization of storage for access data and provisioning of access models.


Author(s):  
Sérgio Luís Guerreiro

When organizations are collaborating, their access control models need to interoperate. However, there are too many access control model variants, and the interoperability enforcement consumes extra effort. In this context, this chapter identifies the challenges of how to design and enforce a meta-access control model to facilitate the interoperability between the different access control mechanisms available. The problem is posed using an ontological approach. Then, the challenges are explained using a descriptive explanation of the meta access control enforcement. The core issues addressed are access models interoperability, standardization of storage for access data, and provisioning of access models.


Author(s):  
Laurent Gomez ◽  
Annett Laube ◽  
Alessandro Sorniotti

Access control is the process of granting permissions in accordance to an authorization policy. Mobile and ubiquitous environments challenge classical access control solutions like Role-Based Access Control. The use of context-information during policy definition and access control enforcement offers more adaptability and flexibility needed for these environments. When it comes to low-power devices, such as wireless sensor networks, access control enforcement is normally too heavy for such resource-constrained devices. Lightweight cryptography allows encrypting the data right from its production and the access is therefore intrinsically restricted. In addition, all access control mechanisms require an authenticated user. Traditionally, user authentication is performed by means of a combination of authentication factors, statically specified in the access control policy of the authorization service. Within ubiquitous and mobile environment, there is a clear need for a flexible user authentication using the available authentication factors. In this chapter, different new techniques to ensure access control are discussed and compared to the state-of-the-art.


Sign in / Sign up

Export Citation Format

Share Document