F Ertam - Physica A: Statistical Mechanics and Its Applications, 2019 - Elsevier
Nowadays, internet is mostly used communication tool worldwide. However, the major problem of the internet is to provide security. To provide internet security, many researches …
The development of distributed applications arises multiple security issues such as access control. Attribute-Based Access Control has been proposed as a generic access control …
JK Lee, T Hong, G Li - Journal of Communications and …, 2021 - ieeexplore.ieee.org
In an high-performance computing (HPC), supercomputing service environment, the security of infrastructure nodes that are points of contact for researchers is very important. We have …
R Alsaqour, A Motmi, M Abdelhaq - International journal of …, 2021 - kiss.kstudy.com
This is an era of technology and with the rapid growth of the Internet, networks are continuously growing. Companies are shifting from simple to more complex networks. Since …
R Effendi - Jurnal TEKSAGRO, 2020 - journal.lp2stm.or.id
Advances in technology, especially computer networks are very helpful in the field of information and processing of desired information data without limited space and time by …
In big data environments with big number of users and high volume of data, we need to manage the corresponding huge number of security policies. Using Attribute-Based Access …
Logs record the events and actions performed within an organization's systems and networks. Usually, log data should conform with the security policy in use. However, access …
Access control policies (more briefly: policies) are used to filter accesses to resources. A policy is usually defined by a table of rules that specify which access requests (more briefly …