[go: up one dir, main page]

Mousavi et al., 2019 - Google Patents

Constructing cascade bloom filters for efficient access enforcement

Mousavi et al., 2019

View PDF
Document ID
16505668221565426061
Author
Mousavi N
Tripunitara M
Publication year
Publication venue
Computers & Security

External Links

Snippet

We address access enforcement—the process of determining whether a request for access to a resource by a principal should be granted. While access enforcement is essential to security, it must not unduly impact performance. Consequently, we address the issue of time …
Continue reading at uwspace.uwaterloo.ca (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/52Programme synchronisation; Mutual exclusion, e.g. by means of semaphores; Contention for resources among tasks
    • G06F9/524Deadlock detection or avoidance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Similar Documents

Publication Publication Date Title
Iyer et al. Mining positive and negative attribute-based access control policy rules
US7290279B2 (en) Access control method using token having security attributes in computer system
Schneider et al. Nexus authorization logic (nal) design rationale and applications
Davidson et al. Provenance views for module privacy
Lin et al. An approach to evaluate policy similarity
Popek Protection structures
Jahid et al. MyABDAC: compiling XACML policies for attribute-based database access control
US10038724B2 (en) Electronic access controls
Eiers et al. Quantifying permissiveness of access control policies
Mousavi et al. Constructing cascade bloom filters for efficient access enforcement
Godyn et al. Analysis of solutions for a blockchain compliance with GDPR
Hamidi et al. Database Security Mechanisms in MySQL
Yang Teaching database security and auditing
Van Geelkerken et al. Using blockchain to strengthen the rights granted through the GDPR
Ge et al. Secure databases: an analysis of Clark-Wilson model in a database environment
Biskup et al. Inference-proof view update transactions with minimal refusals
Glukharev et al. Access Differentiation in Object-Oriented Databases Based on the Extended Object-Oriented Harrison–Ruzzo–Ullman Model
El Ouazzani et al. Dynamic management of data warehouse security levels based on user profiles
Elouazzani et al. User Profile Management to protect sensitive data in Warehouses
Moniruzzaman et al. A study of privacy policy enforcement in access control models
Mohamed A New Auditing Mechanism for Open Source NoSQL Database: A Case Study on Open Source MongoDB Database
US20250200203A1 (en) Statistics visibility control in enclave database
Lopriore Access control lists in password capability environments
Baiardi et al. D3F: A Framework to Minimize the Impact of Intrusions
Shen et al. Lattice based BLP extended model