A Survey on Administrative Policies in Rule- Based Access Control
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 11
Abstract
Administrative controls contains the official written policies, rules, events and standards. It form the outline for running the organization and handling people. The Rule-Based access control defines detailed circumstances for access to a demanded object. It uses an elementary user-naming syntax, thus can interoperate with maximum certification methods. In the previous work tabling is used to compute the atoms derivable from the transformed policy which leads to abductive atom-reachability problem, there is no easing on use of wildcard and negation, there is only accumulation and removal of facts, not rules. Our projected work uses penetrating, talented state-space exploration, which covers over all static and dynamic information in all states. In this paper we compare the existing administrative polices in rule based access control methodologies with the proposed methodology.
Authors and Affiliations
Thirunavukkarasu S , S. Umarani , D. Sharmila
A Survey on Administrative Policies in Rule- Based Access Control
Administrative controls contains the official written policies, rules, events and standards. It form the outline for running the organization and handling people. The Rule-Based access control defines detailed circumstan...
Apriori algorithm on Marine Fisheries Biological Data
Data Mining (DM) is the process of analysing data from different vista and gives summary on specific determination. Association rules are rules describing the associations or correlations to bring out the hidden pattern...
Peer to Peer Cooperation for Caching in Wireless Networks
Some recent studies have shown that cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. All these studies are at a very high level, leaving many design...
Suggested Cluster Co-ordinator Protocol for Concurrency Control in Distributed DBMS
Distributed Database Management system is a need of the hour. The concurrent transactions are not only important in any Data Base Management System but are also important in Distributed DBMS. For the data to be in consis...
A HYBRID FRAGILE HIGH CAPACITY WATERMARKING TECHNIQUE WITH TEMPLATE MATCHING DETECTION SCHEME.
With the rapid growth in the development of digital content, the terms security and privacy are very challenging issues. Watermarking is a broad interesting field which provides way in hiding an informal or formal data i...