A Survey on Administrative Policies in Rule- Based Access Control
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 11
Abstract
Administrative controls contains the official written policies, rules, events and standards. It form the outline for running the organization and handling people. The Rule-Based access control defines detailed circumstances for access to a demanded object. It uses an elementary user-naming syntax, thus can interoperate with maximum certification methods. In the previous work tabling is used to compute the atoms derivable from the transformed policy which leads to abductive atom-reachability problem, there is no easing on use of wildcard and negation, there is only accumulation and removal of facts, not rules. Our projected work uses penetrating, talented state-space exploration, which covers over all static and dynamic information in all states. In this paper we compare the existing administrative polices in rule based access control methodologies with the proposed methodology.
Authors and Affiliations
Thirunavukkarasu S , S. Umarani , D. Sharmila
Advantages of Blackman Window over Hamming Window Method for designing FIR Filter
In signal processing, there are mainly two types of filters exist and the are Finite Impulse Response(FIR) filter and Infinite Impulse Response(IIR) filter. Finite Impulse Response(FIR) filter can be designed form Infini...
COMPREHENSIVE STUDY AND COMPARISON OF INFORMATION DISPERSAL TECHNIQUES FOR CLOUD COMPUTING
Cloud systems refer to the collection of interconnected servers that are provisioned dynamically on demand, for execution of applications, to the customer like electricity grid. Cloud computing has gained great attention...
EXTRACT THE PUNJABI WORD WITH EDGE DETECTOR FROM MACHINE PRINTED DOCUMENT IMAGES
Optical character recognition is the essential area of research in the world. Text segmentation and extraction is an important task under the OCR System. OCR system depends on the quality of the input document and type o...
A Performance Evaluation on Face Image Enhancement with Salt & Pepper Noise Using Gaussian Filtering
Filtering of noise is one of the most important tasks in digital image processing. Elimination of noise is an image is still a challenging task for the researchers. Various researches were underlying on face recognition...
Detection of Packet Dropping and Modification in Wireless Sensor Network
Security is crucial for wireless sensor networks deployed in hostile environments. The packet droppers and packet modifiers may be random. Identifying such attacks is very difficult and sometimes impossible. In this pape...