role based
Recently Published Documents


TOTAL DOCUMENTS

2156
(FIVE YEARS 354)

H-INDEX

56
(FIVE YEARS 5)

2022 ◽  
Author(s):  
Martin Benoît Azanguezet Quimatio ◽  
TSOGNONG FIDELE ◽  
Marcellin Julius Nkenlifack

Abstract Companies' information systems are regularly exposed to internal attacks perpetrated by users who have been granted access to the system. Discretionary, mandatory, role-based and organization-based access control models do not guarantee optimal protection against these attacks because these models trust in users. Therefore, they are unable to protect the system against attacks carried out by authenticated users, especially the super user who can carry out any type of internal attack on information system's data. The objective of this paper is to propose a model that excludes any trust in users. To do so, our model extends the OrBAC (Organization Based Access Control) model by integrating two concepts: the organizational hierarchy and the redundant authentication. The model thus implemented offers a hierarchical and redundant access control to data and processing in an information system based on zero trust in users.


2022 ◽  
Author(s):  
Martin Benoît Azanguezet Quimatio ◽  
TSOGNONG FIDELE ◽  
Marcellin Julius Nkenlifack

Abstract Companies' information systems are regularly exposed to internal attacks perpetrated by users who have been granted access to the system. Discretionary, mandatory, role-based and organization-based access control models do not guarantee optimal protection against these attacks because these models trust in users. Therefore, they are unable to protect the system against attacks carried out by authenticated users, especially the super user who can carry out any type of internal attack on information system's data. The objective of this paper is to propose a model that excludes any trust in users. To do so, our model extends the OrBAC (Organization Based Access Control) model by integrating two concepts: the organizational hierarchy and the redundant authentication. The model thus implemented offers a hierarchical and redundant access control to data and processing in an information system based on zero trust in users.


2022 ◽  
Author(s):  
Martin Benoît Azanguezet Quimatio ◽  
TSOGNONG FIDELE ◽  
Marcellin Julius Nkenlifack

Abstract Companies' information systems are regularly exposed to internal attacks perpetrated by users who have been granted access to the system. Discretionary, mandatory, role-based and organization-based access control models do not guarantee optimal protection against these attacks because these models trust in users. Therefore, they are unable to protect the system against attacks carried out by authenticated users, especially the super user who can carry out any type of internal attack on information system's data. The objective of this paper is to propose a model that excludes any trust in users. To do so, our model extends the OrBAC (Organization Based Access Control) model by integrating two concepts: the organizational hierarchy and the redundant authentication. The model thus implemented offers a hierarchical and redundant access control to data and processing in an information system based on zero trust in users.


2022 ◽  
Author(s):  
Martin Benoît Azanguezet Quimatio ◽  
TSOGNONG FIDELE ◽  
Marcellin Julius Nkenlifack

Abstract Companies' information systems are regularly exposed to internal attacks perpetrated by users who have been granted access to the system. Discretionary, mandatory, role-based and organization-based access control models do not guarantee optimal protection against these attacks because these models trust in users. Therefore, they are unable to protect the system against attacks carried out by authenticated users, especially the super user who can carry out any type of internal attack on information system's data. The objective of this paper is to propose a model that excludes any trust in users. To do so, our model extends the OrBAC (Organization Based Access Control) model by integrating two concepts: the organizational hierarchy and the redundant authentication. The model thus implemented offers a hierarchical and redundant access control to data and processing in an information system based on zero trust in users.


2022 ◽  
Author(s):  
Martin Benoît Azanguezet Quimatio ◽  
TSOGNONG FIDELE ◽  
Marcellin Julius Nkenlifack

Abstract Companies' information systems are regularly exposed to internal attacks perpetrated by users who have been granted access to the system. Discretionary, mandatory, role-based and organization-based access control models do not guarantee optimal protection against these attacks because these models trust in users. Therefore, they are unable to protect the system against attacks carried out by authenticated users, especially the super user who can carry out any type of internal attack on information system's data. The objective of this paper is to propose a model that excludes any trust in users. To do so, our model extends the OrBAC (Organization Based Access Control) model by integrating two concepts: the organizational hierarchy and the redundant authentication. The model thus implemented offers a hierarchical and redundant access control to data and processing in an information system based on zero trust in users.


Sensors ◽  
2022 ◽  
Vol 22 (1) ◽  
pp. 338
Author(s):  
Matevž Pustišek ◽  
Min Chen ◽  
Andrej Kos ◽  
Anton Kos

Blockchain ecosystems are rapidly maturing and meeting the needs of business environments (e.g., industry, manufacturing, and robotics). The decentralized approaches in industries enable novel business concepts, such as machine autonomy and servitization of manufacturing environments. Introducing the distributed ledger technology principles into the machine sharing and servitization economy faces several challenges, and the integration opens new interesting research questions. Our research focuses on data and event models and secure upgradeable smart contract platforms for machine servitization. Our research indicates that with the proposed approaches, we can efficiently separate on- and off-chain data and assure scalability of the DApp without compromising the trust. We demonstrate that the secure upgradeable smart contract platform, which was adapted for machine servitization, supports the business workflow and, at the same time, assures common identification and authorization of all the participants in the system, including people, devices, and legal entities. We present a hybrid decentralized application (DApp) for the servitization of 3D printing. The solution can be used for or easily adapted to other manufacturing domains. It comprises a modular, upgradeable smart contract platform and off-chain machine, customer and web management, and monitoring interfaces. We pay special attention to the data and event models during the design, which are fundamental for the hybrid data storage and DApp architecture and the responsiveness of off-chain interfaces. The smart contract platform uses a proxy contract to control the access of smart contracts and role-based access control in function calls for blockchain users. We deploy and evaluate the DApp in a consortium blockchain network for performance and privacy. All the actors in the solution, including the machines, are identified by their blockchain accounts and are compeers. Our solution thus facilitates integration with the traditional information-communication systems in terms of the hybrid architectures and security standards for smart contract design comparable to those in traditional software engineering.


Society ◽  
2021 ◽  
Vol 9 (2) ◽  
pp. 429-446
Author(s):  
Jenny Koce Matitaputty

Soa is a combination of several genealogically territorial eyes of the house. Each Soa usually has a symbol in the form of Totem, which is the identity of each Soa. Soa is still maintained until now. Even every symbol or Totem is still present in implementing traditional ceremonies. This study aimed to discover Soa and its role based on Totem in Negeri Hutumuri, South Leitimur Sub-district, Ambon City. This research is qualitative. The data source was obtained by purposive sampling. The Soa heads and traditional elders were used as informants. Data collection techniques through interviews, participatory observation, and documentation. The results of the study show: 1) Soa in the life of the people of Negeri Hutumuri consists of 5 Soa, namely Soa Pattihutung, Soa Mokihutung, Soa Tutupasar, Soa Lapaut, and Soa Puasel. 2) The role of each Soa is based on the Totem: 1. Soa Pattihutung, with the symbol of the Soa pigeon is role as an honest leader in leadership (King); 2. Soa Mokihutung symbolizes the Soa Mangole bird in charge of maintaining maritime security (Kewang sea/marine police). 3. Soa Tutupasar with the symbol of Soa, namely Soa-Soa, in charge of maintaining forest security (Kewang land/forest police). 4. Soa Lapaut, with the symbol of the Soa snake, is in charge of maintaining security and order (police/soldiers). 5. Soa Puasel, with the symbol of the Soa frog maintaining the cleanliness of water and art in the Negeri Hutumuri.


Author(s):  
Maria Anatoliivna Borodin ◽  
Volodymyr Oleksandrovych Mietielov

The problem of sharing of educational information and research of components interaction on load distribution from users is considered. Purpose: to implement software to solve this problem. Design a database and project structure. Role-based access to information should be implemented. A user-friendly interface must be created for the software. Develop tests for the program that should be implemented to check the functionality and performance of the program. Use the developed tests to conduct research on load distribution from users. The developed program consists two parts (server and client). They interact using HTTP requests. The server part processes the data and verifies them. The client part receives and provides data to the server part and implements a user-friendly interface. The solution of this problem is implemented in the environments IntelliJ Idea 2020.1 (Ultimate Edition) and WebStorm 2020.1. Java 11 and JavaScript (ECMAScript 6) programming languages were used for implementation. The novelty of the work lies in the development of a program that makes it possible to use the functions necessary for studying at a higher educational institution. For example, providing students with access to study materials, the ability for all users to view their schedule. Instructors can also view the schedule of the groups they teach in the current semester. Each student can revise the teacher's schedule if he teaches at least one subject. Another important function is the management of the structure of the university (management of information about institutes, departments and study groups). We also conducted research on the performance of the program and investigated the possibility of improving the speed of the program in the event of a significant increase in active users.


Sign in / Sign up

Export Citation Format

Share Document