SecTTS: A secure track & trace system for RFID-enabled supply chains

J Shi, Y Li, W He, D Sim - Computers in Industry, 2012 - Elsevier
Due to the highly sensitive business information communicated within RFID-enabled supply
chain networks, there is an urgent need for a secure and effective track & trace system. In …

SecDS: a secure EPC discovery service system in EPCglobal network

J Shi, D Sim, Y Li, R Deng - Proceedings of the second ACM conference …, 2012 - dl.acm.org
In recent years, the Internet of Things (IOT) has drawn considerable attention from the
industrial and research communities. Due to the vast amount of data generated through IOT …

A secure and efficient discovery service system in EPCglobal network

J Shi, Y Li, RH Deng - Computers & Security, 2012 - Elsevier
In recent years, the Internet of Things (IOT) has drawn considerable attention from the
industrial and research communities. Due to the vast amount of data generated through IOT …

An environment-based RBAC model for internal network

Y Fu, Y Liu, D Liu, F Lou, K Yan - 2016 First IEEE International …, 2016 - ieeexplore.ieee.org
Role-based access control is widely used in information system of internal network, but there
are still many limitations when there is a large number of roles and objects in the system …

Fine grained access control for relational databases by abstract interpretation

R Halder, A Cortesi - Software and Data Technologies: 5th International …, 2013 - Springer
In this paper, we propose an observation-based fine grained access control (OFGAC)
mechanism where data are made accessible at various level of abstraction according to …

Analyzing and controlling information inference of fine-grained access control policies in relational databases

J Shi, G Fu, J Weng, H Zhu - 2013 Fourth International …, 2013 - ieeexplore.ieee.org
As a more flexible and effective access control mechanism in databases, fine-grained
access control (FGAC) has drawn considerable attention from industrial and research …

A different approach of intrusion detection and Response System for Relational Databases

J Parmar, P Jain - 2013 International Conference on Green …, 2013 - ieeexplore.ieee.org
Database is an important part for any organization and this database needs to make secure
from various attacks in the network. Although there are various techniques implemented in …

A classification based approach to create database policy for Intrusion Detection and Respond anomaly requests

J Parmar - 2014 Conference on IT in Business, Industry and …, 2014 - ieeexplore.ieee.org
Database is an important asset of any leading and emerging industry and this database
needs to improved security features from various threats in the network and database …

EACF: extensible access control framework for cloud environments

F Mehak, R Masood, MA Shibli, I Elgedway - Annals of …, 2017 - Springer
The dynamic authorization and continuous monitoring of resource usage in cloud
environments is a challenge. Moreover, the extant access control techniques are not well …

VPD 细粒度访问控制系统

王振辉, 王振铎, 张敏, 王艳丽 - 计算机系统应用, 2013 - cqvip.com
为解决日益严峻的Web 数据库安全现况和适应企业信息管理系统中对访问控制灵活多变的需求,
分析了目前访问控制方案, 对虚拟专用数据库技术进行研究, 提出基于行数据的细粒度访问控制 …