Secure cloud-mediator architecture for mobile-government using RBAC and DUKPT

Q Kharma, N Turab, Q Shambour, M Hassan - 2020 - learntechlib.org
Smart mobile devices and cloud computing are widely used today. While mobile and
portable devices have different capabilities, architectures, operating systems, and …

Content-Based Access Control

W Zeng - 2015 - kuscholarworks.ku.edu
In conventional database, the most popular access control model specifies policies explicitly
for each role of every user against each data object manually. Nowadays, in large-scale …

Mediation security specification and enforcement for heterogeneous databases

L Yang, RK Ege, H Yu - Proceedings of the 2005 ACM symposium on …, 2005 - dl.acm.org
Information sharing among heterogeneous databases requires increasing attention and
poses a pressing need. Successful protection of information by an effective access control …

Optimizing Secure Collaboration Transactions for Modern Information Systems

R Whittaker, G Argote-Garcia… - … on Systems (icons …, 2008 - ieeexplore.ieee.org
The issue of securing a collaboration within an information system is often addressed from
the viewpoint of establishing a security policy that grants access to data by what role an …

Collaboration security for modern information systems

R Whittaker, G Argote-Garcia, PJ Clarke… - … Conference on Security …, 2006 - scitepress.org
One of the main approaches to accessing heterogeneous data is via the use of a mediation
framework. The current problem with mediation systems is that they are viewed as black …

[图书][B] Enhanced skip-list search algorithm in 3-layer mediator framework

Q Kharma - 2005 - search.proquest.com
Abstract The Three-Layer distributed mediation architecture, designed by Secure System
Architecture laboratory, employed a layered framework of presence, integration, and …

Decentralized mediation security

R Whittaker, G Argote-Garcia… - … on Parallel and …, 2008 - ieeexplore.ieee.org
Information systems that use the mediation architecture are well suited to accessing
heterogeneous data in a distributed environment. These mediation systems utilize a central …

E-Chord: Keyword-Based search algorithm based on DHT in mediation architecture

Q Kharma, R Ege, SA Shaar - INFOCOMP Journal of Computer …, 2007 - infocomp.dcc.ufla.br
E-Chord is a Distributed Hash Table algorithm (DHT) inspired from Chord, Pastry and CAN
algorithms. It meant to provide a keyword-based search in the Three-Layer Mediation …

Enforcement of Privacy Preferences in Data Services: A SPARQL Query Rewriting Approach

S Oulmakhzoune - 2013 - theses.hal.science
With the constant proliferation of information systems around the globe, the need for
decentralized and scalable data sharing mechanisms has become a major factor of …

[PDF][PDF] CREDENTIAL BASED MEDIATOR ARCHITECTURE FOR ACCESS CONTROL AND DATA INTEGRATION

N Dagdee, R Vijaywargiya - Citeseer
In multiple data sources environment where open access is to be provided to the users not
known to the system, the credential based access control has emerged as a suitable …