scholarly journals Access Control to Objects and their Description in the Future Network of Information

2010 ◽  
Vol 6 (3) ◽  
pp. 359-374 ◽  
Author(s):  
Eric Renault ◽  
Ahmad Ahmad ◽  
Mohamed Abid
Keyword(s):  
Author(s):  
Alya Geogiana Buja

This paper proposes cybersecurity features in the National e-Learning policy. Cybersecurity in the learning environment is becoming an issue that has been considered by the community.  DePAN 1.0 and DePAN 2.0 policies have not been carefully planned in any related security concerns. Amongst security domains in e-learning are authentication and accountability, access control, and non-repudiation issues. However, as the functionality of e-learning is expanding, information must be actively protected in this bigger context to avoid the loss of its confidentiality, integrity, and availability. Therefore, the existing policy and guidelines on e-learning have been studied thoroughly.  A very feasible study has been conducted on the existing literature and related works to e-learning and e-learning.  The security threats are also reviewed in this paper.  Based on the established e-Learning policy, therefore, the proposed security features are namely (CSF1) authentication and accountability, (CSF2) access control, (CSF3) protection of communication, and (CSF4) non-repudiation issues.  The findings from this study can be added to the implementation of e-learning in the future.


2020 ◽  
Vol 1 ◽  
pp. 1934-1960
Author(s):  
Anna Triantafyllou ◽  
Jose Antonio Perez Jimenez ◽  
Alejandro Del Real Torres ◽  
Thomas Lagkas ◽  
Konstantinos Rantos ◽  
...  
Keyword(s):  

IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Smriti Bhatt ◽  
Thanh Kim Pham ◽  
Maanak Gupta ◽  
James Benson ◽  
Jaehong Park ◽  
...  

2012 ◽  
Vol 3 (4) ◽  
pp. 45-64 ◽  
Author(s):  
Safaà Hachana ◽  
Nora Cuppens-Boulahia ◽  
Frédéric Cuppens

The concept of role has revolutionized the access control systems by making them more efficient and by simplifying their management. Role mining is the discipline of automating the definition of roles in a given access control system. It is a vivid research area, which has attracted a growing interest in the last years. Research on role mining has produced several interesting contributions in this field, and has also raised several related issues toward leveraging them in actual enterprises. This paper is a comprehensive analysis of the main research directions around role mining and the future trends. The authors present the problem of role mining, the current achievements to solve it and the related open issues. With this objective, they define a complete and realistic business process for Role Mining, and the authors sequentially analyze the issues related to each step of the process by investigating the main contributions in the literature. They also point the unhandled issues and we highlight the future perspectives.


2018 ◽  
Author(s):  
◽  
Zephaniah Philani Khumalo

A Smart Grid (SG) generally refers to a modernized power grid system that incorporates Infor­ mation and Communications Technologies (ICT) so that a two way communication between the grid system (utility) and power users ensures power supply efficiency and optimization to the users. In a way, an SG is an evolved version of legacy power grid systems that manages electricity de­ mand in a sustainable, reliable and economic manner, built on advanced infrastructure and tuned to facilitate the integration of all involved. The provisioning of duplex communication between the utility and itsusers (customers) allows key devicessuch as SMs to interact directly with the utility 's control center (CC). SGs are destined for provisioning a cleaner environmental sustainable and renewable energy for the future. Its successes mostly rely on advanced ICT design and architecture. It is imperative that it meets the future data transmission and design performance requirements in terms ofrobustness, reliability, and at the same time ensuring end-to-end data exchanges with min­ imal latencies and losses. The incorporation oflCT, however, results in security and access control challenges, as a result complex network arrangement may be exploited by hackers among other things, access private information and sensitive data, hence the necessity to address vulnerabilities of such systems. Typ­ ical consequences or repercussions of security and access control threats include energy theft by way of altering of SM data. At present, it is cost effective to implement the ICT related infrastruc­ ture on the currently unused power line spectrum (i.e. above 50Hz) hence in this work, Power Line Communication (PLC) is elected for provisioning this platform. As such, PLC implementation shall imply the digital communication in power lines concurrently with electrical power transmission and ensuring uninterruption of either of the services, as well as guaranteed efficiency. We address approaches to increasing the data rate of transmission and re­ duction of bit error rates. That will enhance the performance of PLC and redevelopment ofreliable JCT without additional cost to the existing infrastructure of electrical grids. We also address secu­ rity and access control by implementing Advanced Encryption Standard (AES) protocol to secure SG related data in our proposed security and access control framework. Results show that the sys­ tem has low computational requirements, minimal latency and as well ensures confidentiality and integrity. The simulation is run on a combined MATLAB/ OPNET platform.


Sign in / Sign up

Export Citation Format

Share Document