Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
27,511
result(s) for
"access control policy"
Sort by:
Statement Recognition of Access Control Policies in IoT Networks
by
Ma, Li
,
Bu, Zhaoxiong
,
Yang, Zexian
in
Access control
,
access control policies
,
access control policy recognition
2023
Access Control Policies (ACPs) are essential for ensuring secure and authorized access to resources in IoT networks. Recognizing these policies involves identifying relevant statements within project documents expressed in natural language. While current research focuses on improving recognition accuracy through algorithm enhancements, the challenge of limited labeled data from individual clients is often overlooked, which impedes the training of highly accurate models. To address this issue and harness the potential of IoT networks, this paper presents FL-Bert-BiLSTM, a novel model that combines federated learning and pre-trained word embedding techniques for access control policy recognition. By leveraging the capabilities of IoT networks, the proposed model enables real-time and distributed training on IoT devices, effectively mitigating the scarcity of labeled data and enhancing accessibility for IoT applications. Additionally, the model incorporates pre-trained word embeddings to leverage the semantic information embedded in textual data, resulting in improved accuracy for access control policy recognition. Experimental results substantiate that the proposed model not only enhances accuracy and generalization capability but also preserves data privacy, making it well-suited for secure and efficient access control in IoT networks.
Journal Article
Internet censorship : a reference handbook
\"Covering topics ranging from web filters to laws aimed at preventing the flow of information, this book explores freedom--and censorship--of the Internet and considers the advantages and disadvantages of policies at each end of the spectrum\"-- Provided by publisher.
Competitive political regime and Internet control : case studies of Malaysia, Thailand and Indonesia
2014
Why are policies of internet control adopted in a democratic state, while internet freedom is guaranteed in a more authoritarian context? In this work on the comparative politics of internet control, it is argued that regime type per se is not the direct determinant of the internet control outcome. Instead, the book proposes an alternative model that addresses the intensity of online transgressiveness and the capacity of online civil society. While online transgressiveness propels governments.
Sharing linked data for health research : toward better decision making
\"The genesis of this project was the experience of the authors working with researchers, data custodians, ethics committees, and linkage units over the past decade or more managing access to government administrative data for research. Our individual backgrounds, experience, and expertise meant that we brought a diverse, interdisciplinary approach to the table. We started to identify the problems: we heard from researchers that there were concerns with unjustified delay and lack of access to data for research that was in the public interest; we heard from data custodians that they found the decision-making process difficult because they did not have sufficient resources or guidance; we heard from ethics committees that they found data linkage projects complex and difficult to assess; and we heard from consumer representatives that there were concerns about privacy, transparency, community awareness, and consultation\"-- Provided by publisher.
Access Control Models
2021
Access control is a part of the security of information technologies. Access control regulates the access requests to system resources. The access control logic is formalized in models. Many access control models exist. They vary in their design, components, policies and areas of application. With the developing of information technologies, more complex access control models have been created. This paper is concerned with overview and analysis for a number of access control models. First, an overview of access control models is presented. Second, they are analyzed and compared by a number of parameters: storing the identity of the user, delegation of trust, fine-grained policies, flexibility, object-versioning, scalability, using time in policies, structure, trustworthiness, workflow control, areas of application etc. Some of these parameters describe the access control models, while other parameters are important characteristics and components of these models. The results of the comparative analysis are presented in tables. Prospects of development of new models are specified.
Journal Article
Genetic data and the law : a critical perspective on privacy protection
\"Research using genetic data raises various concerns relating to privacy protection. Many of these concerns can also apply to research that uses other personal data, but not with the same implications for failure. The norms of exclusivity associated with a private life go beyond the current legal concept of personal data to include genetic data that relates to multiple identifiable individuals simultaneously and anonymous data that could be associated with any number of individuals in different, but reasonably foreseeable, contexts. It is the possibilities and implications of association that are significant, and these possibilities can only be assessed if one considers the interpretive potential of data. They are missed if one fixates upon its interpretive pedigree or misunderstands the meaning and significance of identification. This book demonstrates how the public interest in research using genetic data might be reconciled with the public interest in proper privacy protection\"-- Provided by publisher.
Adaptive context-aware access control for IoT environments leveraging fog computing
by
Salehi Shahraki, Ahmad
,
Pardede, Eric
,
Kayes, A. S. M.
in
Access
,
Access control
,
Behavior modification
2024
The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from unauthorized access. A cloud-based access control approach brings significant challenges in terms of communication overhead, high latency, and complete reliance. In this paper, we propose a Fog-Based Adaptive Context-Aware Access Control (FB-ACAAC) framework for IoT devices, dynamically adjusting access policies based on contextual information to prevent unauthorised resource access. The main purpose of FB-ACAAC is to provide adaptability to changing access behaviors and context by bringing decision-making and information about policies closer to the end nodes of the network. FB-ACAAC improves the availability of resources and reduces the amount of time for information to be processed. FB-ACAAC extends the widely used eXtensible Access Control Markup Language (XACML) to manage access control decisions. Traditional XACML-based methods do not take into account changing environments, different contexts, and changing access behaviors and are vulnerable to certain types of attacks. To address these issues, FB-ACAAC proposes an adaptive context-aware XACML scheme for heterogeneous distributed IoT environments using fog computing and is designed to be context-aware, adaptable, and secure in the face of unauthorised access. The effectiveness of this new scheme is verified through experiments, and it has a low processing time overhead while providing extra features and improved security.
Journal Article
Scalable and secure access control policy for healthcare system using blockchain and enhanced Bell–LaPadula model
2021
Access control is a policy in data security that controls access to resources. The current access control mechanisms are facing many problems, due to the interference of the third-party, privacy, and security of data. These problems can be addressed by blockchain, the technology that gained major attention in recent years and has many capabilities. However, in the blockchain network, every peer maintains the same state of the ledger to view the complete history of transactions that leads to scalability issues in the blockchain network. To address the problem of scalability we propose an enhanced Bell–LaPadula model and categorized the peers and transactions in different clearance and security levels. The peers don’t have to maintain the complete history of transactions owing to the clearance level. To provide data security in the network we constructed a dynamic access control policies using a smart contracts. We test our model on a blockchain-based healthcare network. The Hyperledger Fabric tool is used to run a complete infrastructure of healthcare organization while the Hyperledger composer modeling tool is used to implement the smart contracts and to provide dynamic access control functionality on the blockchain network.
Journal Article