Achieving secure, scalable, and fine-grained data access control in cloud computing

S Yu, C Wang, K Ren, W Lou - 2010 Proceedings IEEE …, 2010 - ieeexplore.ieee.org
… file access control list (ACL) for fine-grained access controlaccess structures, we define a
public key component for each attribute. Data files are encrypted using public key components

Group-wise principal component analysis for exploratory intrusion detection

J Camacho, R Therón, JM García-Giménez… - … Access, 2019 - ieeexplore.ieee.org
… In this context, the use of multivariate approaches such as Principal Component Analysis
(PCA) provided promising results in the past. PCA can be used in exploratory mode or in …

[PDF][PDF] An overview of independent component analysis and its applications

GR Naik, DK Kumar - Informatica, 2011 - informatica.si
… A key concept that constitutes the foundation of independent component analysis is statistical
independence. To simplify the above discussion consider the case of two different random …

[PDF][PDF] An application of principal component analysis to the detection and visualization of computer network attacks

K Labib, VR Vemuri - Annales des télécommunications, 2006 - researchgate.net
… These are typically mis-configured hosts that allow the translation of broadcast IP addresses
to broadcast Medium Access Control (MAC) addresses. The attacker uses a spoofed source …

[PDF][PDF] Principal component analysis for face recognition

SP Bahurupi, DS Chaudhari - International Journal of Engineering and …, 2012 - Citeseer
… a wide range of potential applications such as access control, banking, information security,
… of face recognition system by using Principal Component Analysis (PCA) method. PCA is a …

A role-based access control model and reference implementation within a corporate intranet

DF Ferraiolo, JF Barkley, DR Kuhn - ACM Transactions on Information …, 1999 - dl.acm.org
… Web server administrators usually control user access to enterprise published documents
through creation and maintenance of access control lists (ACLs) on a server-by-server basis. …

Autonomous profile-based anomaly detection system using principal component analysis and flow analysis

G Fernandes Jr, JJPC Rodrigues, ML Proenca Jr - Applied Soft Computing, 2015 - Elsevier
… The proposed system presented in this paper is called PCADS-AD (principal component
analysis for digital signature and anomaly detection), and it is divided into two steps: traffic …

Proposed NIST standard for role-based access control

DF Ferraiolo, R Sandhu, S Gavrila, DR Kuhn… - ACM Transactions on …, 2001 - dl.acm.org
… decade that role-based access control has emerged as a full-fledged model as mature as
traditional mandatory access control (MAC) and discretionary access control (DAC) concepts. …

[PDF][PDF] A comparative study of face recognition with principal component analysis and cross-correlation technique

S Asadi, C Rao, V Saikrishna - International Journal of Computer …, 2010 - Citeseer
… viz., security control, crime investigation, and entrance control in buildings, access control at
… of Eigen faces and PCA (Principal Component Analysis). Another method based on Cross-…

[PDF][PDF] Detecting and visualizing denialof-service and network probe attacks using principal component analysis

K Labib, VR Vemuri - Third Conference on Security and Network …, 2004 - cs.ucdavis.edu
… These are typically mis-configured hosts that allow the translation of broadcast IP addresses
to broadcast Medium Access Control (MAC) addresses. The attacker uses a spoofed source …