2014 International Conference on Signal Propagation and Computer Technology (ICSPCT 2014) 2014
DOI: 10.1109/icspct.2014.6884907
|View full text |Cite
|
Sign up to set email alerts
|

An efficient fine grained access control scheme based on attributes for enterprise class applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…Access control is one of the key aspects of information security [42]. Access Control is a mechanism to provide privileges to a user to access a particular asset, only if this user is authorized [19] and Access Control is domain specific. Methods that are widely used in Access Control mentioned in [17], [43] are: DAC, MAC, and RBAC.…”
Section: Related Work On Access Controlmentioning
confidence: 99%
See 1 more Smart Citation
“…Access control is one of the key aspects of information security [42]. Access Control is a mechanism to provide privileges to a user to access a particular asset, only if this user is authorized [19] and Access Control is domain specific. Methods that are widely used in Access Control mentioned in [17], [43] are: DAC, MAC, and RBAC.…”
Section: Related Work On Access Controlmentioning
confidence: 99%
“…R-MAC provides a secure data exchange framework using some of those components to help preserve the ownership of data at a fine granularity. Fine-grained access control provides the right privileges to a user to grant him/her access to an asset only if this user is authorized [19]. In addition, XML security technologies provide fine-grained and persistent security controls that move with the data.…”
Section: Introductionmentioning
confidence: 99%
“…Controlling access rights to different portions of data is the key concept of Fine-Grained Access Control (FGAC). FGAC governs the access to data by each user of the system (Chatterjee et al, 2014, Harith and Gábor, 2009, Jinyuan and Yuguang, 2010, Liu et al, 2012, Yu et al, 2010, Rizvi et al, 2004 based on the "need-to-know" principle. The lack of FGAC is an open problem in HISs.…”
Section: Introductionmentioning
confidence: 99%
“…It substantiates the reaching of these systems to the flexible and trustable access control technology much faster [20]. However, this flexibility increases the occurrences of policy conflicts and makes the maintenance and administration of the policies difficult [48][49][50][51].…”
Section: Attribute Based Access Controlmentioning
confidence: 99%
“…A hierarchical structure is built with the role designations. Thus, a user coming to the system is assigned to the roles according to status, the requested access field, and the requested administration privileges [20,21]. Besides, similar to how it happens in other systems, rather than making the permissions and limitations work all the time, these are called into action if the user needs them via the role.…”
Section: Role Based Access Controlmentioning
confidence: 99%