Mousavi et al., 2019 - Google Patents
Constructing cascade bloom filters for efficient access enforcementMousavi et al., 2019
View PDF- Document ID
- 16505668221565426061
- Author
- Mousavi N
- Tripunitara M
- Publication year
- Publication venue
- Computers & Security
External Links
Snippet
We address access enforcement—the process of determining whether a request for access to a resource by a principal should be granted. While access enforcement is essential to security, it must not unduly impact performance. Consequently, we address the issue of time …
- 238000000034 method 0 abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/52—Programme synchronisation; Mutual exclusion, e.g. by means of semaphores; Contention for resources among tasks
- G06F9/524—Deadlock detection or avoidance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Iyer et al. | Mining positive and negative attribute-based access control policy rules | |
US7290279B2 (en) | Access control method using token having security attributes in computer system | |
Schneider et al. | Nexus authorization logic (nal) design rationale and applications | |
Davidson et al. | Provenance views for module privacy | |
Lin et al. | An approach to evaluate policy similarity | |
Popek | Protection structures | |
Jahid et al. | MyABDAC: compiling XACML policies for attribute-based database access control | |
US10038724B2 (en) | Electronic access controls | |
Eiers et al. | Quantifying permissiveness of access control policies | |
Mousavi et al. | Constructing cascade bloom filters for efficient access enforcement | |
Godyn et al. | Analysis of solutions for a blockchain compliance with GDPR | |
Hamidi et al. | Database Security Mechanisms in MySQL | |
Yang | Teaching database security and auditing | |
Van Geelkerken et al. | Using blockchain to strengthen the rights granted through the GDPR | |
Ge et al. | Secure databases: an analysis of Clark-Wilson model in a database environment | |
Biskup et al. | Inference-proof view update transactions with minimal refusals | |
Glukharev et al. | Access Differentiation in Object-Oriented Databases Based on the Extended Object-Oriented Harrison–Ruzzo–Ullman Model | |
El Ouazzani et al. | Dynamic management of data warehouse security levels based on user profiles | |
Elouazzani et al. | User Profile Management to protect sensitive data in Warehouses | |
Moniruzzaman et al. | A study of privacy policy enforcement in access control models | |
Mohamed | A New Auditing Mechanism for Open Source NoSQL Database: A Case Study on Open Source MongoDB Database | |
US20250200203A1 (en) | Statistics visibility control in enclave database | |
Lopriore | Access control lists in password capability environments | |
Baiardi et al. | D3F: A Framework to Minimize the Impact of Intrusions | |
Shen et al. | Lattice based BLP extended model |