Access Control and Security Mechanisms On Sensitive Information

Abstract

Protection preserving module anonymizes the information to gather security necessities and crudeness requirements on predicates set by the entrance control gadget. We make this correspondence as the issue of k-anonymous. Part based Access Control (RBAC) consents to huge authorizations on items in light of parts in an association. A RBAC strategy arrangement is made out of an arrangement of Users (U), an arrangement of Roles (R), and an arrangement of Permissions (P). The entrance control approaches disclose choice predicates available to parts in the meantime as the protection impulse is to satisfy the k-anonymity or ldiversity.

Authors and Affiliations

P. Srivijaya| Dept. of CSE,Kakinada institute of Engineering&Tech., Korangi,EG.Dt, AP,India, D. Srinivas| Dept. of CSE,Kakinada institute of Engineering&Tech., Korangi,EG.Dt, AP,India

Keywords

Related Articles

Latest Advancements and Future Patterns in Wireless Sensor Networks

Wireless Sensor systems (WSNs) have turned out to be a standout amongst the most intriguing ranges of research in the previous couple of years. A WSN is made out of various remote sensor hubs which frame a sensor fie...

Protection Tolerate Access Manipulate Procedure for Relational Data

In general, security is accomplished at the expense of accuracy of approved information. In this paper, we propose a productive access control strategy. I this technique for anonymization calculations and show experi...

Efficient IP Trace back Mechanism for Identifying IP Spoofers

is well known that aggressors or spoofers may utilize fake source IP address to hide their genuine areas from victims. So, to catch these spoofers a number of techniques for tracing IP address have been proposed .But...

New Multilevel Inverter Topology for Direct GridIntegration of Renewable Energy Systems

Owing to the fact that we are getting into quick development in innovation, strong state semiconductors have prompted the improvement of medium-voltage control converters which could deflect the requirement for high...

Resonant Current Control Of Three Phase Grid Connected Photovoltaic Inverters

This paper presents a new control technique used to reduce the harmonic distortion of current, without increasing the computational load of the standard current control abnormal conditions. The proposed control techn...

Download PDF file
  • EP ID EP16786
  • DOI -
  • Views 335
  • Downloads 9

How To Cite

P. Srivijaya, D. Srinivas (2016). Access Control and Security Mechanisms On Sensitive Information. International Journal of Science Engineering and Advance Technology, 4(9), 460-463. https://europub.co.uk/articles/-A-16786