|
|
|
Shengyang Li, Zhen Wang and Wanfeng Zhang
Cloud computing has become one of the key technologies used for big data processing and analytics. User management on cloud platforms is a growing challenge as the number of users and the complexity of systems increase. In light of the user-management sy...
ver más
|
|
|
|
|
|
|
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num...
ver más
|
|
|
|
|
|
|
Jie Tang, Bin Zhang and Umair Akram
Personal information has been likened to ?golden data?, which companies have chased using every means possible. Via mobile apps, the incidents of compulsory authorization and excessive data collection have evoked privacy concerns and strong repercussions...
ver más
|
|
|
|
|
|
|
Amna Batool, Seng W. Loke, Niroshinie Fernando and Jonathan Kua
This paper proposes a policy management framework which we call the SANIJO framework. This framework comprises three different types of policy rules that are applicable to smart devices for managing their multiuser?multidevice interactions in IoT collect...
ver más
|
|
|
|
|
|
|
Sara Monaliza Sousa Nogueira, Marco Aurélio dos Santos, Sandro Alberto Vianna Lordelo, José Rodrigues de Farias Filho
Pág. e47064
The Brazilian fish farming in Federal reservoirs is being discouraged by the country's current legal system due to the bureaucracy and the involvement of many agencies. This research provides a survey of the problems related to the current processes of A...
ver más
|
|
|
|
|
|
|
Gabriel Nyame and Zhiguang Qin
Role-based access control (RBAC) continues to gain popularity in the management of authorization concerning access to knowledge assets in organizations. As a socio-technical concept, the notion of role in RBAC has been overemphasized, while very little a...
ver más
|
|
|
|
|
|
|
Wei Sun, Hui Su and Huacheng Xie
Recently, attribute-based access control (ABAC) has received increasingly more attention and has emerged as the desired access control mechanism for many organizations because of its flexibility and scalability for authorization management, as well as it...
ver más
|
|
|
|
|
|
|
L Raghavendar Raju,C R K Reddy
Pág. pp. 40 - 51
Identifying trusted nodes for safe communication is a key challenge in mobile ad-hoc networks. Node compromises a service and leads to uncertainty in node behaviour. Computing the node trust and node management will enhance the security aspect...
ver más
|
|
|
|
|
|
|
Wei Sun, Hui Su and Hongbing Liu
Role-based access control (RBAC) is one of the most popular access-control mechanisms because of its convenience for management and various security policies, such as cardinality constraints, mutually exclusive constraints, and user-capability constraint...
ver más
|
|
|
|
|
|
|
Febdwi Suryani
Pág. 83 - 94
This study aims to analyze the internal control system and procedures of lending activities in UEDSP Desa Tanah Merah Kecamatan Siak Hulu Kabupaten Kampar. Internal control of lending activities to an organizations is one important aspect. Data resources...
ver más
|
|
|
|