scholarly journals Source Directed Access Control on the Internet

1996 ◽  
Author(s):  
S. Bradner
Keyword(s):  
2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


2011 ◽  
Vol 403-408 ◽  
pp. 2628-2631
Author(s):  
Jiang Yi Shi ◽  
Kun Chen ◽  
Kang Li ◽  
Zhi Xiong Di

With the Internet services increased explosively, the requirement for network bandwidth is rigorous. Upon the extraordinary development of process capability, Memory access control has become a key factor that impacts the performance of network processor. The paper proposed a storage management for fast packet buffers in network processor, which can enhance the utilization of bandwidth. Experiment results shows that this approach improved the rates of accessing to memory system in network processor remarkably.


Author(s):  
Rekha Bhatia ◽  
Manpreet Singh Gujral

Due to the ever increasing number of web services available through the Internet, the privacy as a fundamental human right is endangered. Informed consent and collection of information are two important aspects while interacting on the Internet through web services. The ease of data access and the ready availability of it through Internet, made it easier for interested parties to intrude into the individual's privacy in unprecedented ways. The regulatory and technical solutions adopted to curb this have achieved only a limited success. The main culprits in this regard are the incompatibilities in the regulatory measures and standards. This research work focuses on privacy preserving access control for sharing sensitive information in the arena of web services, provides some recent outlooks towards the critical need of privacy aware access control technologies and a comprehensive review of the existing work in this arena. Besides, a novel framework for privacy aware access to web services is also provided.


Author(s):  
Toru Homan ◽  
Masaya Morita ◽  
Yu Yamaguchi ◽  
Kazuhiro Kuwabara

This paper describes a topic database for conversation support for people with cognitive handicaps such as aphasia. The authors implemented a topic database based on word lists developed for people with aphasia as an RDF database to exploit the conceptual relationships among words and extended it to include web resources a user needs. To allow database personalization, the authors introduce an access control mechanism and incorporate the topic database into a chat system for remote conversation support over the Internet.


Author(s):  
George Pallis ◽  
Konstantina Stoupa ◽  
Athena Vakali

The Internet (and networks overall) are currently the core media for data and knowledge exchange. XML is currently the most popular standardization for Web document representation and is rapidly becoming a standard for data representation and exchange over the Internet. One of the main issues is XML documents and in particular, storage and accessing. Among data management issues, storage and security techniques have a particular importance, since the performance of the overall XML-based Web information system relies on them. Storage issues mainly rely on the usage of typical database management systems (DBMSs), whereas XML documents can also be stored in other storage environments (such as file systems and LDAP directories) (Amer-Yahia & Fernandez, 2002; Kanne & Moerkotte, 2000; Silberschatz, Korth & Sudarshan, 2002). Additionally, in order to guarantee the security of the XML data, which are located in a variety of the above storage topologies, the majority of implementations also provide an appropriate access control. Most storage systems cooperate with access control modules implementing various models (Joshi, Aref, Ghafoor & Spafford, 2001), whereas there are few commercial access control products available. However, there are some standardized XML-based access control languages that can be adopted by most tools.


2013 ◽  
Vol 58 (5-6) ◽  
pp. 1189-1205 ◽  
Author(s):  
Sergio Gusmeroli ◽  
Salvatore Piccione ◽  
Domenico Rotondi

Sign in / Sign up

Export Citation Format

Share Document