This document summarizes a thesis proposal presentation on generalized attribute centric access control. The presentation covered the problem statement of achieving completely mediated access control in dynamic environments where privacy and anonymity are important. It discussed limitations of traditional access control models and reviewed literature on attribute based access control. The proposed solution involved developing a family of attribute centric access control models that are context sensitive, fine-grained, and multi-factor. Potential applications and impact were also discussed.
IRJET- A Review On - Controlchain: Access Control using BlockchainIRJET Journal
This document summarizes several access control models that could be used for the Internet of Things (IoT), including Mandatory Access Control (MAC), Discretionary Access Control (DAC), Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Organization-Based Access Control (OrBAC), and OAuth. It discusses the key components, advantages, and limitations of each model. Specifically, it notes that MAC and DAC focus on confidentiality but lack flexibility, RBAC is well-suited for independent domains but not cross-domains, ABAC provides more flexible access based on user, resource, and environment attributes defined in XACML policies, and OrBAC extends this to incorporate organizational
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Distributed and Typed Role-based Access Control Mechanisms Driven by CRUD Exp...ijcsta
Business logics of relational databases applications are an important source of security violations, namely in respect
to access control. The situation is particularly critical when access control policies are many and complex. In these
cases, programmers of business logics can hardly master the established access control policies. Now we consider
situations where business logics are built with tools such as JDBC and ODBC. These tools convey two sources of
security threats: 1) the use of unauthorized Create, Read, Update and Delete (CRUD) expressions and also 2) the
modification of data previously retrieved by Select statements. To overcome this security gap when Role-based
access control policies are used, we propose an extension to the basic model in order to control the two sources
of security threats. Finally, we present a software architectural model from which distributed and typed RBAC
mechanisms are automatically built, this way relieving programmers from mastering any security schema. We
demonstrate empirical evidence of the effectiveness of our proposal from a use case based on Java and JDBC.
Web-Based System for Software Requirements Quality Analysis Using Case-Based ...IOSR Journals
This document proposes a web-based system to analyze the quality of software requirements specifications (SRS) using case-based reasoning (CBR) and artificial neural networks (ANN). CBR solves new problems by comparing them to past, stored cases, but this can be inefficient when the case base is large. The proposed system improves the retrieval phase of CBR by using ANN to more efficiently measure the similarity between a new case and existing cases. This results in a web-based system that allows users to input SRS quality attributes and indicators, analyzes the SRS using CBR integrated with ANN, and presents a quality analysis report. The system is intended to help software developers better understand SRS quality and requirements.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Knowledge...sunda2011
This document provides an abstract for 8 projects in knowledge and data engineering for the year 2011-2012 from Elysium Technologies Private Limited. It lists the projects, which include dual framework for targeted online data delivery, fast multiple longest common subsequence algorithm, fuzzy self-constructing feature clustering for text classification, generic multilevel architecture for time series prediction, link analysis extension of correspondence analysis for mining relational databases, machine learning approach for identifying disease-treatment relations in short texts, personalized ontology model for web information gathering, and adaptive cluster distance bounding for high-dimensional indexing. It also provides contact information for Elysium Technologies' offices in various locations.
Verification of the protection services in antivirus systems by using nusmv m...ijfcstjournal
In this paper, a model of protection services in the antivirus system is proposed. The antivirus system
behavior separate in to preventive and control behaviors. We extract the properties which are expected
from the model of antivirus system approach from control behavior in the form of CTL and LTL temporal
logic formulas. To implement the behavior models of antivirus system approach, the ArgoUML tool and the
NuSMV model checker are employed. The results show that the antivirus system approach can detects
fairness, reachability, deadlock free and verify some properties of the proposed model verified by using
NuSMV model checker.
IRJET- A Review On - Controlchain: Access Control using BlockchainIRJET Journal
This document summarizes several access control models that could be used for the Internet of Things (IoT), including Mandatory Access Control (MAC), Discretionary Access Control (DAC), Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Organization-Based Access Control (OrBAC), and OAuth. It discusses the key components, advantages, and limitations of each model. Specifically, it notes that MAC and DAC focus on confidentiality but lack flexibility, RBAC is well-suited for independent domains but not cross-domains, ABAC provides more flexible access based on user, resource, and environment attributes defined in XACML policies, and OrBAC extends this to incorporate organizational
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Distributed and Typed Role-based Access Control Mechanisms Driven by CRUD Exp...ijcsta
Business logics of relational databases applications are an important source of security violations, namely in respect
to access control. The situation is particularly critical when access control policies are many and complex. In these
cases, programmers of business logics can hardly master the established access control policies. Now we consider
situations where business logics are built with tools such as JDBC and ODBC. These tools convey two sources of
security threats: 1) the use of unauthorized Create, Read, Update and Delete (CRUD) expressions and also 2) the
modification of data previously retrieved by Select statements. To overcome this security gap when Role-based
access control policies are used, we propose an extension to the basic model in order to control the two sources
of security threats. Finally, we present a software architectural model from which distributed and typed RBAC
mechanisms are automatically built, this way relieving programmers from mastering any security schema. We
demonstrate empirical evidence of the effectiveness of our proposal from a use case based on Java and JDBC.
Web-Based System for Software Requirements Quality Analysis Using Case-Based ...IOSR Journals
This document proposes a web-based system to analyze the quality of software requirements specifications (SRS) using case-based reasoning (CBR) and artificial neural networks (ANN). CBR solves new problems by comparing them to past, stored cases, but this can be inefficient when the case base is large. The proposed system improves the retrieval phase of CBR by using ANN to more efficiently measure the similarity between a new case and existing cases. This results in a web-based system that allows users to input SRS quality attributes and indicators, analyzes the SRS using CBR integrated with ANN, and presents a quality analysis report. The system is intended to help software developers better understand SRS quality and requirements.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Knowledge...sunda2011
This document provides an abstract for 8 projects in knowledge and data engineering for the year 2011-2012 from Elysium Technologies Private Limited. It lists the projects, which include dual framework for targeted online data delivery, fast multiple longest common subsequence algorithm, fuzzy self-constructing feature clustering for text classification, generic multilevel architecture for time series prediction, link analysis extension of correspondence analysis for mining relational databases, machine learning approach for identifying disease-treatment relations in short texts, personalized ontology model for web information gathering, and adaptive cluster distance bounding for high-dimensional indexing. It also provides contact information for Elysium Technologies' offices in various locations.
Verification of the protection services in antivirus systems by using nusmv m...ijfcstjournal
In this paper, a model of protection services in the antivirus system is proposed. The antivirus system
behavior separate in to preventive and control behaviors. We extract the properties which are expected
from the model of antivirus system approach from control behavior in the form of CTL and LTL temporal
logic formulas. To implement the behavior models of antivirus system approach, the ArgoUML tool and the
NuSMV model checker are employed. The results show that the antivirus system approach can detects
fairness, reachability, deadlock free and verify some properties of the proposed model verified by using
NuSMV model checker.
This document discusses the evolution of access control models from DAC to ABAC. It provides an overview of Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC). ABAC is described as a new model that controls access based on multiple attributes of subjects, objects, and the environment, allowing for more flexible and fine-grained access decisions. The document predicts that by 2020, 70% of businesses will use ABAC due to its scalability and ability to incorporate real-time context into authorization decisions.
Larry Hjalmarson is the Vice President of Safety, Environmental and Pipeline Integrity at Williams Gas Pipeline. Williams Gas Pipeline operates over 15,000 miles of natural gas transmission pipelines across 21 states. Hjalmarson discussed Williams' commitment to safety culture and mitigating threats to pipelines from external and internal corrosion, manufacturing and construction defects, equipment issues, excavation damage, and other threats. He also outlined Williams' integrated approach to risk assessment and prevention and mitigation activities under its integrity management program.
The document discusses managing cyber security across enterprises, specifically in oil and gas. It notes that 76% of organizations report an increase in sophistication of cyber attacks against infrastructure. The energy industry experiences 53% of cyber incidents, posing challenges as industrial control systems have a longer lifespan than enterprise systems and require more consideration of security during implementation. The presentation recommends a risk-based, defense-in-depth approach to security including network segmentation to help mitigate risks across an organization, though risks cannot be eliminated entirely given growing hacker knowledge and more sophisticated attacks.
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...NextLabs, Inc.
As companies globalize and consolidate their SAP systems, they face an increasing need to control access to sensitive data based on fine grained user profiles. Traditionally, companies have managed this access by defining fine grained roles, leading to an explosion of roles that are inconsistent and hard to manage.
In this webinar series, attendees will learn:
- The key trends driving role explosion
- The challenges of role explosion
- Example use cases that drive role explosion
- How attribute-based access control (ABAC) can alleviate the problem
Attendees will also see demonstrations of use cases illustrating how role explosion happens, and how ABAC can help reduce role explosion.
Semantic technologies for attribute based access: measurable security for the...Josef Noll
This presentation provides an intro into the need for "measurable security" when envisioning an Internet for each of us ("People"), powered by sensors and devices ("Things"), and providing Services tailored to your needs.
It handles the challenge of information security, postulating that different applications need different security mechanisms: "To inform somebody about a train arrival time" requires less security than "controlling an industrial plant by automated processes, based on input from sensors".
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerProlifics
IBM Pulse 2012 presentation by Alex Ivkin (Prolifics) and Grey Thrasher (IBM)
Synthesizing the business view of IT resources with the technical implementation of Role Based Access Control remains one of the toughest challenges in Identity Management today. We will walk through a real-world use case to understand how organizations can utilize the new IBM Role and Policy Modeler (RaPM) tool to discover essential business relationships and map them to IT access permissions, creating the schema for a comprehensive RBAC system. We will explain how the design criteria provided by RaPM has enabled the foundation of a comprehensive Identity and Role Lifecycle Management structure. The follow-on implementation of an RBAC system in the Identity Provisioning platform, IBM Tivoli Identity Manager, will be explored, as well as how this organization is automating access privileges, simplifying internal security controls and reducing the complexity of audit and compliance enforcement.
Enterprise & Web based Federated Identity Management & Data Access Controls Kingsley Uyi Idehen
This presentation breaks down issues associated with federated identity management and protected resource access controls (policies). Specifically, it uses Virtuoso and RDF to demonstrate how this longstanding issue has been addressed using the combination of RDF based entity relationship semantics and Linked Open Data.
Information Security Principles - Access Controlidingolay
The document discusses various concepts related to access controls and authentication methods in information security. It covers identification, authentication, authorization, accountability and different authentication factors like something you know, something you have, something you are. It also discusses access control models, biometrics, passwords and single sign-on systems.
Access Control: Principles and PracticeNabeel Yoosuf
Slides prepared based on the paper Access Control: Principles and Practice by Ravi S. Sandhu and Pierangela Samarati, IEEE Communications Magazine, 1994
This document provides an overview of access control, including identification, authentication, and authorization. It discusses different types of access controls like administrative, technical, and physical controls. It also covers specific access control methods like passwords, biometrics, smart cards, and tokens. Identification establishes a subject's identity, while authentication proves the identity. Authorization then controls the subject's access to resources based on their proven identity. The document categorizes access controls as preventive, detective, corrective, recovery, compensating, and directive. It provides examples of different administrative, technical, and physical controls that fall into each category.
This presentation covers the topic of access control in software. Access control is an essential part of every software application that manages data of any value. However, access control is also complex and hard to get right, both from a development and management point of view.
In this presentation, we first explore the concept and goals of access control in general. We then discuss the different models that exist in practice and in literature to reason about access control. We then investigate different approaches of how to enforce access control in an application. Overall, this sessions aims to provide deeper insights into access control in order to better reason about it and implement it correctly and efficiently.
The document proposes developing software to enable secure and authorized dynamic group resource management. It aims to implement attribute-based access control and dynamic delegation of access rights to address limitations in existing group-centric applications. The research plan involves three phases: literature review and requirements analysis; core implementation of access control and delegation features; and testing, performance analysis, and real-world deployment. The proposed software would facilitate secure collaboration and resource sharing for educational institutions and organizations.
Siva Sankar G is seeking a challenging position as an electrical/control engineer or instrumentation engineer. He has a M.Tech in Instrumentation and Control Systems from Jawaharlal Nehru Technological University, Kakinada with expertise in power systems, control systems, MATLAB Simulink. He has work experience in electrical machines and control systems. His academic projects involve renewable energy systems and direct torque control of induction motors using artificial intelligence techniques. He is proficient in English, Telugu, C, C++ and familiar with software like MATLAB Simulink, LABVIEW.
Siva Sankar G is seeking a challenging position as an electrical/control engineer or instrumentation engineer. He has a M.Tech in Instrumentation and Control Systems from Jawaharlal Nehru Technological University, Kakinada with expertise in power systems, control systems, MATLAB Simulink. He has work experience in electrical machines and control systems with good communication and problem solving skills. His academic projects involved renewable energy systems and improving induction motor control using artificial intelligence techniques.
I am Bachelor in Electrical Engineering from a reputable institute of Pakistan and currently I am working in Saudi Binladin Group O&M Haramain, Makkah, KSA.
This document is a resume for Hafiz Ullah. It summarizes his contact information, career objective, education history, tools and technologies experience, final year project details, other projects, professional courses, internships and work experience, languages, and availability to provide references. Hafiz holds a Master's degree in electrical engineering and a Bachelor's degree in electronics engineering, and has work experience in automation, instrumentation and control systems.
This document discusses a research project on developing an extensible access control framework for cloud-based applications. It is being conducted by the KTH Applied Information Security Lab in collaboration with NUST. The project aims to address authorization and access control issues in cloud computing. It involves developing software requirements, architecture design documents, implementing attribute-based access control and other models, and testing the framework on OpenStack cloud instances. Progress updates and future milestones are provided over nine project quarters.
Siddharth Roshan has over 1.5 years of experience as a Commissioning Engineer working on grid solutions and renewable power projects. He has a bachelor's degree in electrical engineering and seeks a career advancing renewable and conventional power. His experience includes commissioning HVAC substations, implementing SCADA systems, testing equipment, and managing remote operations and power flow as part of a national transmission project. He also has internship experience studying substation operations and regulating peak power flow.
The document provides a summary of skills and experience for an electrical engineering job applicant. It lists their expertise in areas such as power electronics, electric machines, DSP coding, and control systems. It also outlines their technical skills with various software programs and languages. Their education includes a master's degree from Northeastern University and undergraduate degree from Bangladesh University of Engineering & Technology. For experience, they have worked on research projects related to power converters and inverters. They have also held teaching assistant and lecturer roles. The document includes details of graduate design projects and publications.
The document summarizes the skills and qualifications of an individual with experience in power electronics, renewable energy systems, and electrical engineering. Specifically:
- The individual has 2+ years of hands-on experience in power converters and inverters as well as experience in DSP coding, microcontrollers, analog and digital control systems, modeling/simulation, and PCB design.
- They have an MS in Electrical Engineering from Northeastern University and BS in Electrical Engineering from Bangladesh University of Engineering & Technology.
- Recent experience includes research assistant roles involving the design of inverters for PV systems and wireless power transfer systems as well as teaching assistant roles.
- The individual has published conference and journal papers and completed
Bharathram Adithya Murali is seeking a career in power systems engineering. He has a Master's degree in Electrical Engineering from University at Buffalo and a Bachelor's degree from SRM Easwari Engineering College in India. He has experience interning at Globe Metallurgical where he assisted the engineering team and learned various software programs. His academic projects include designing a residential power generation system and automating a factory assembly line using PLC programming.
This document advertises a two-day master class on advance power system relaying theory and application to be held on November 28th and 29th 2014 in Mumbai, India. The class will cover topics such as power system faults, protection schemes, relaying applications, and new technologies impacting protective relaying. It provides contact information for nominations and lists the course speakers' qualifications.
This document discusses the evolution of access control models from DAC to ABAC. It provides an overview of Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC). ABAC is described as a new model that controls access based on multiple attributes of subjects, objects, and the environment, allowing for more flexible and fine-grained access decisions. The document predicts that by 2020, 70% of businesses will use ABAC due to its scalability and ability to incorporate real-time context into authorization decisions.
Larry Hjalmarson is the Vice President of Safety, Environmental and Pipeline Integrity at Williams Gas Pipeline. Williams Gas Pipeline operates over 15,000 miles of natural gas transmission pipelines across 21 states. Hjalmarson discussed Williams' commitment to safety culture and mitigating threats to pipelines from external and internal corrosion, manufacturing and construction defects, equipment issues, excavation damage, and other threats. He also outlined Williams' integrated approach to risk assessment and prevention and mitigation activities under its integrity management program.
The document discusses managing cyber security across enterprises, specifically in oil and gas. It notes that 76% of organizations report an increase in sophistication of cyber attacks against infrastructure. The energy industry experiences 53% of cyber incidents, posing challenges as industrial control systems have a longer lifespan than enterprise systems and require more consideration of security during implementation. The presentation recommends a risk-based, defense-in-depth approach to security including network segmentation to help mitigate risks across an organization, though risks cannot be eliminated entirely given growing hacker knowledge and more sophisticated attacks.
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...NextLabs, Inc.
As companies globalize and consolidate their SAP systems, they face an increasing need to control access to sensitive data based on fine grained user profiles. Traditionally, companies have managed this access by defining fine grained roles, leading to an explosion of roles that are inconsistent and hard to manage.
In this webinar series, attendees will learn:
- The key trends driving role explosion
- The challenges of role explosion
- Example use cases that drive role explosion
- How attribute-based access control (ABAC) can alleviate the problem
Attendees will also see demonstrations of use cases illustrating how role explosion happens, and how ABAC can help reduce role explosion.
Semantic technologies for attribute based access: measurable security for the...Josef Noll
This presentation provides an intro into the need for "measurable security" when envisioning an Internet for each of us ("People"), powered by sensors and devices ("Things"), and providing Services tailored to your needs.
It handles the challenge of information security, postulating that different applications need different security mechanisms: "To inform somebody about a train arrival time" requires less security than "controlling an industrial plant by automated processes, based on input from sensors".
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerProlifics
IBM Pulse 2012 presentation by Alex Ivkin (Prolifics) and Grey Thrasher (IBM)
Synthesizing the business view of IT resources with the technical implementation of Role Based Access Control remains one of the toughest challenges in Identity Management today. We will walk through a real-world use case to understand how organizations can utilize the new IBM Role and Policy Modeler (RaPM) tool to discover essential business relationships and map them to IT access permissions, creating the schema for a comprehensive RBAC system. We will explain how the design criteria provided by RaPM has enabled the foundation of a comprehensive Identity and Role Lifecycle Management structure. The follow-on implementation of an RBAC system in the Identity Provisioning platform, IBM Tivoli Identity Manager, will be explored, as well as how this organization is automating access privileges, simplifying internal security controls and reducing the complexity of audit and compliance enforcement.
Enterprise & Web based Federated Identity Management & Data Access Controls Kingsley Uyi Idehen
This presentation breaks down issues associated with federated identity management and protected resource access controls (policies). Specifically, it uses Virtuoso and RDF to demonstrate how this longstanding issue has been addressed using the combination of RDF based entity relationship semantics and Linked Open Data.
Information Security Principles - Access Controlidingolay
The document discusses various concepts related to access controls and authentication methods in information security. It covers identification, authentication, authorization, accountability and different authentication factors like something you know, something you have, something you are. It also discusses access control models, biometrics, passwords and single sign-on systems.
Access Control: Principles and PracticeNabeel Yoosuf
Slides prepared based on the paper Access Control: Principles and Practice by Ravi S. Sandhu and Pierangela Samarati, IEEE Communications Magazine, 1994
This document provides an overview of access control, including identification, authentication, and authorization. It discusses different types of access controls like administrative, technical, and physical controls. It also covers specific access control methods like passwords, biometrics, smart cards, and tokens. Identification establishes a subject's identity, while authentication proves the identity. Authorization then controls the subject's access to resources based on their proven identity. The document categorizes access controls as preventive, detective, corrective, recovery, compensating, and directive. It provides examples of different administrative, technical, and physical controls that fall into each category.
This presentation covers the topic of access control in software. Access control is an essential part of every software application that manages data of any value. However, access control is also complex and hard to get right, both from a development and management point of view.
In this presentation, we first explore the concept and goals of access control in general. We then discuss the different models that exist in practice and in literature to reason about access control. We then investigate different approaches of how to enforce access control in an application. Overall, this sessions aims to provide deeper insights into access control in order to better reason about it and implement it correctly and efficiently.
The document proposes developing software to enable secure and authorized dynamic group resource management. It aims to implement attribute-based access control and dynamic delegation of access rights to address limitations in existing group-centric applications. The research plan involves three phases: literature review and requirements analysis; core implementation of access control and delegation features; and testing, performance analysis, and real-world deployment. The proposed software would facilitate secure collaboration and resource sharing for educational institutions and organizations.
Siva Sankar G is seeking a challenging position as an electrical/control engineer or instrumentation engineer. He has a M.Tech in Instrumentation and Control Systems from Jawaharlal Nehru Technological University, Kakinada with expertise in power systems, control systems, MATLAB Simulink. He has work experience in electrical machines and control systems. His academic projects involve renewable energy systems and direct torque control of induction motors using artificial intelligence techniques. He is proficient in English, Telugu, C, C++ and familiar with software like MATLAB Simulink, LABVIEW.
Siva Sankar G is seeking a challenging position as an electrical/control engineer or instrumentation engineer. He has a M.Tech in Instrumentation and Control Systems from Jawaharlal Nehru Technological University, Kakinada with expertise in power systems, control systems, MATLAB Simulink. He has work experience in electrical machines and control systems with good communication and problem solving skills. His academic projects involved renewable energy systems and improving induction motor control using artificial intelligence techniques.
I am Bachelor in Electrical Engineering from a reputable institute of Pakistan and currently I am working in Saudi Binladin Group O&M Haramain, Makkah, KSA.
This document is a resume for Hafiz Ullah. It summarizes his contact information, career objective, education history, tools and technologies experience, final year project details, other projects, professional courses, internships and work experience, languages, and availability to provide references. Hafiz holds a Master's degree in electrical engineering and a Bachelor's degree in electronics engineering, and has work experience in automation, instrumentation and control systems.
This document discusses a research project on developing an extensible access control framework for cloud-based applications. It is being conducted by the KTH Applied Information Security Lab in collaboration with NUST. The project aims to address authorization and access control issues in cloud computing. It involves developing software requirements, architecture design documents, implementing attribute-based access control and other models, and testing the framework on OpenStack cloud instances. Progress updates and future milestones are provided over nine project quarters.
Siddharth Roshan has over 1.5 years of experience as a Commissioning Engineer working on grid solutions and renewable power projects. He has a bachelor's degree in electrical engineering and seeks a career advancing renewable and conventional power. His experience includes commissioning HVAC substations, implementing SCADA systems, testing equipment, and managing remote operations and power flow as part of a national transmission project. He also has internship experience studying substation operations and regulating peak power flow.
The document provides a summary of skills and experience for an electrical engineering job applicant. It lists their expertise in areas such as power electronics, electric machines, DSP coding, and control systems. It also outlines their technical skills with various software programs and languages. Their education includes a master's degree from Northeastern University and undergraduate degree from Bangladesh University of Engineering & Technology. For experience, they have worked on research projects related to power converters and inverters. They have also held teaching assistant and lecturer roles. The document includes details of graduate design projects and publications.
The document summarizes the skills and qualifications of an individual with experience in power electronics, renewable energy systems, and electrical engineering. Specifically:
- The individual has 2+ years of hands-on experience in power converters and inverters as well as experience in DSP coding, microcontrollers, analog and digital control systems, modeling/simulation, and PCB design.
- They have an MS in Electrical Engineering from Northeastern University and BS in Electrical Engineering from Bangladesh University of Engineering & Technology.
- Recent experience includes research assistant roles involving the design of inverters for PV systems and wireless power transfer systems as well as teaching assistant roles.
- The individual has published conference and journal papers and completed
Bharathram Adithya Murali is seeking a career in power systems engineering. He has a Master's degree in Electrical Engineering from University at Buffalo and a Bachelor's degree from SRM Easwari Engineering College in India. He has experience interning at Globe Metallurgical where he assisted the engineering team and learned various software programs. His academic projects include designing a residential power generation system and automating a factory assembly line using PLC programming.
This document advertises a two-day master class on advance power system relaying theory and application to be held on November 28th and 29th 2014 in Mumbai, India. The class will cover topics such as power system faults, protection schemes, relaying applications, and new technologies impacting protective relaying. It provides contact information for nominations and lists the course speakers' qualifications.
Swakshar Ray has over 15 years of experience in electrical engineering. He currently works as a scientist at ABB focusing on HVDC and FACTS systems. Previously he held research positions at GE and ABB researching topics like wide area control, power system modeling, and energy storage. He holds a PhD in electrical engineering from the University of Missouri with a focus on intelligent wide area control.
Debanjan Sannigrahi is seeking a position as an Electronics and Telecommunication Engineer. He has over 4 years of experience working on projects at IIT Bombay in renewable energy and has qualifications in electronics, telecommunications, solar energy, and networking. He is proficient in programming languages like C, C++, and Java and has experience designing circuits and developing software.
Sorab Mattoo is seeking a full-time position utilizing his analytical and technical skills. He has over 9 years of experience in designing protection and control systems for power grids and substations at Siemens and ABB. Mattoo has an MSEE from North Carolina State University with a focus on power systems engineering. He is proficient in various protection relay software, CAD tools, and communication protocols.
- V.T. Kairamkonda is an Indian electrical engineer specializing in control, protection, and power electronics systems. He has over 30 years of experience in design, development, engineering, and commissioning of power and industrial projects.
- He has extensive experience with protection schemes, relay coordination studies, power electronics, software development, and commissioning of substations, power plants, and industrial facilities internationally.
- He currently works as the managing director of his own company, Technologies, based in Mumbai, India, where he provides consulting services including system studies, protection design, and training.
IEEE ICC 2012 - Dependability Assessment of Virtualized NetworksStenio Fernandes
This document proposes a method to estimate dependability attributes (risks) in virtual network environments. It uses a hierarchical modeling approach combining reliability block diagrams and stochastic Petri nets to model large virtual networks. The method was evaluated using a case study that generated virtual network requests and assessed dependability metrics like availability and reliability. The results demonstrate how dependability measures can vary between virtual networks and be impacted by common mode failures. Future work involves improving dependability through fault tolerance and incorporating metrics into resource allocation algorithms.
Nains Jain has over 1 year and 3 months of experience as an IC/VLSI Test Engineer and Manual Test Engineer. He has worked on projects involving IC testing for Qualcomm's FSM90xx family of chips and shift register testing. His responsibilities included test program creation, functional testing, debugging, and result analysis. He is proficient in automation testing tools like Verigy 93000 and Smartest as well as manual testing methodologies. He has a Bachelor's degree in Electronics and Communication Engineering.
Subramanian Ramasamy is an electrical engineer with experience in switch mode power supply design, lighting systems, and product testing and validation. He has a Master's degree in Electrical Engineering from UNLV and is currently an Electrical Engineer at Magtech Industries Corp, where he designs LED lighting products and power supplies. He has expertise in safety testing, dimming controls, thermal and EMC testing, and new product development.
This document summarizes a student project analyzing persistent faults in network access control systems. The project aims to determine average and maximum fault latency in networks of varying sizes when induced faults are present. Packet tracer software is used to simulate networks with 8 to 256 nodes and introduce faults to analyze fault latency. Results were as expected based on standard network fault analysis. Future work could expand to dynamic fault analysis and incorporate fault tolerance techniques.
The document summarizes progress on the TOAN testbed project, which aims to enable evaluation of optical aggregation network components, devices, and concepts within a realistic infrastructure. It discusses plans to:
1) Implement a hierarchical SDN control plane architecture on the testbed to provide distributed and global control of network resources.
2) Enhance the testbed's ability to dynamically allocate bandwidth and adjust modulation schemes based on real-time network monitoring.
3) Characterize various photonic chips from CIAN members and integrate them into the testbed network.
Similar to Generalized attribute centric access control (20)
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
2. 02/04/15
Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
2
Supervisor:
Dr. Abdul Ghafoor
GEC:
Dr. M. Awais Shibli
Mr. Faisal Khan
Ms. Hirra Anwar Arjumand Fatima
Thesis Proposal Defense
SEECS-NUST Islamabad
Generalized Attribute Centric
Access Control
3. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Problem Statement
Introduction
Literature Review
Proposed Solution
Abstract Architecture
Impact
Applications
References
3
Agenda
4. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Achieving completely mediated access control using
existing models is a challenge in dynamic environments,
where ensuring privacy and anonymity is essential,
and fine-grained, flexible and multi-factor authorization is
required.
4
Problem Statement
5. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Controlling access to sensitive
resources
Access is controlled based on
different factors such as identity,
role and attributes
5
Introduction
6. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Evolution of Access Control
Role-Based Access Control (RBAC)
Limitations of Traditional Access Control Models
Addressing the Limitations of Traditional Access Control
Models
• Extended Role Based Access Control Models
• Attribute Based Access Control (ABAC) Model
Extended RBAC Models and their limitations
Attribute Based Access Control (ABAC) Model
The Conventional Debate: RBAC vs ABAC
6
Literature Review
7. 1996 20011992 2007 2009 - 2014
Pre
RBAC
Early
RBAC
Standard
RBAC
Pre ABAC
Extended RBAC
Early
ABAC
RBAC
vs ABAC
Role Centric
A
t
t
r
i
b
u
t
e
C
e
n
t
r
i
C
MAC
DAC
volution of Access Control
8. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
8
Role Based Access Control
OPS OBS
PRMS
ROLESUSERS
SSD
DSDSESSIONS
(UA)
User
Assignment
(PA)
Permission
Assignment
(RH)
Role Hierarchy
Session rolesUser Session
OBS = Objects
OPS = Operations
PRMS = Permissions
SSD= Separation of Duty
DSD = Dynamic Separation of Duty
9. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Limitations of RBAC
Role Engineering Role Activation Role Engineering
10. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Limitations of RBAC
Role Engineering Role Activation Role Engineering
11. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
11
Challenges in Traditional Access Control
Access Control Models
User
Centric
Rigid
Static One Time
Identity
Based
Coarse Grained
Context Insensitive
Single
Factor
12. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Context Sensitivity
13. 02/04/15 13
Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Context Sensitive Access Control
Context Based Access Control Context Aware Access Control
Inherently context sensitive
Attribute Based Access Control (ABAC) Model
Extensions built on top of a context insensitive
model
Extended Role Based Access Control (RBAC) Models
14. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Extended RBAC Models
Team Based Environmental
Roles
Time Based Location Based
15. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Limitations of Extended RBAC Models
Role Centric Too Complex Too Specific
16. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
16
Challenges in Traditional Access Control
Access Control Models
Rigid One Time
Identity
Based
Coarse Grained
Single
Factor
17. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Attribute Based Access Control (ABAC)
Subject
Attributes
Resource
Attributes
Environment
Attributes
Controls access based on the attributes of
Subject, Resource as well as Environment. This
provides a greater flexibility for making access
control decisions as compared to traditional
methods which were mostly subject-centric
and did not consider resource or environment
as the primary factor.
18. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
The Conventional Debate
RBAC
Model
ABAC
Model
19. 02/04/15 19
Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
The Conventional Debate
ABAC RBAC
• Newer
• Simpler to implement
• Attribute-Centric
• Dynamically changing environments
• Attribute Engineering
• Difficult to audit permissions
• Outdated
• Expensive to implement
• Role-Centric
• Static environments
• Role Engineering
• Simplified auditing of resources
20. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Adding Attributes To Role Based Access Control
Option User ID Role Attribute Model
0 0 0 0 Undefined
1 0 0 1 ABAC-basic
2 0 1 0 Undefined
3 0 1 1 ABAC-RBAC hybrid
4 1 0 0 ACL
5 1 0 1 ABAC-ID
6 1 1 0 RBAC-basic
7 1 1 1 RBAC-A dynamic roles
8 1 1 1 RBAC-A role centric
9 1 1 1 RBAC-A attribute centric
• Assigning
permissions to
roles
• Adding further
constraints based
on attributes
• Still role centric
21. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Need Analysis
Existing Work on Attribute Centric Solution
Common Misconceptions
Our Contribution
Core Components
Access Control Mechanism
Family of Access Control Models
Potential Impact
Validity of Proposed Solution
21
Proposed Solution
22. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Attribute Centric Access Control (AC)2
Role-Less Environments Anonymous Users
Flexible
On-Going Control
Fine GrainedMulti-Factor
23. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Existing Work on Attribute Centric Solutions
Attribute Based Access Control (ABAC) Model Already exists but still in nascent state
24. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Existing Work on Attribute Centric Solutions
Lack of Standard Before 2014 Details Still Missing
25. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Common Misconceptions
ABAC
Myth
RBAC
Attribute
Role
Reality
26. 02/04/15 26
Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Common Misconceptions
Myth Reality
• Auditing permissions is easy in RBAC
• Reviewing permissions is difficult in ABAC
• User-Role review is easy
• Permission-Role review is challenging
• We need to divide permission
auditing into smaller tasks for ABAC
as well
• ABAC Model offers fine-grained access
control
• ABAC Model offers multi-factor
access control
27. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Achieving completely mediated access control using
existing models is a challenge in dynamic environments,
where ensuring privacy and anonymity is essential,
and fine-grained, flexible and multi-factor authorization is
required.
27
Problem Statement
28. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Generalized Attribute Centric Access Control
Subject
Object
Environment
Operation
Rules
Permissions
28
Our Contribution
Inherently context sensitive attributes
<Action, User, Object, Environment> Ɛ Rule
<Rule(s)> Ɛ Permission
Where Rule= {Allow, Do not Allow}
29. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
29
Our Contribution
User
Resource
Access Request
PDP
Policy
Repository
Find applicable policy
PAP
Store
policies
PIP
Retrieve attributes
Environment
attribute authority
Resource
attribute
authoritySubject
attribute
authority
Access Response
Allow or deny access
PEP
Access Request
30. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Our Contribution
Context Attribute Authority
Context Provider
Sensors
Context Provider Context Provider
Sensors Sensors
31. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
31
Our Contribution
Attribute
Centric
Access
Control
Constrained (AC)2
Fine Grained(AC)2
Core (AC)2
Towards A Family of Access Control Models
32. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
32
Potential Impact
Interoperability Across Access Control Solutions Compliance and Assurance
33. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
33
Validity
NIST ABAC
Workshop,
July 2013
Guide to Attribute
Based Access Control
(ABAC) Definition and
Considerations,
January 2014
SACMAT 2015
Call for PapersTreating ABAC
as a single
model would
be a mistake.
Towards an
ABAC Family
of Models
34. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
34
Potential Applications
Small Teams with Overlapping Responsibilities (SMEs /
SMBs)
35. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
35
Potential Applications
Bring Your Own Device (BYOD) Security
Authorization
Challenges
36. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
36
Potential Applications
Smart Classrooms (BYOD)
37. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
37
Potential Applications
Restrictive Use of Corporate Devices For
Personal Use
38. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
38
Timeline
Literature Review
TH-1 Form Submission
Problem Identification
Proposal Defense
TH-2 Form Submission (15. 12. 2014)
Implementation (31. 3. 2015)
Testing and Evaluation (30. 4.2015)
Research Paper Writing(10.5.2015)
In-house Defense (15.5.2015)
Final Defense (15.6.2015)
39. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
1. Park, Jaehong, and Ravi Sandhu. "Towards usage control models: beyond traditional access control." Proceedings of the seventh
ACM symposium on Access control models and technologies. ACM, 2002.
2. Sandhu, Ravi S., and Pierangela Samarati. "Access control: principle and practice." Communications Magazine, IEEE 32.9 (1994): 40-
48.
3. Hwang, JeeHyun, Vincent Hu, and Tao Xie. "Paradigm in Verification of Access Control." Software Security and Reliability
Companion (SERE-C), 2012 IEEE Sixth International Conference on. IEEE, 2012.
4. Hu, Vincent C., et al. "Guide to attribute based access control (ABAC) definition and considerations (draft)." NIST Special Publication
800 (2013): 162.
5. Sandhu, Ravi S. "Lattice-based access control models." Computer 26.11 (1993): 9-19.
6. Fuchs, Ludwig, Günther Pernul, and Ravi Sandhu. "Roles in information security–a survey and classification of the research area."
computers & security 30.8 (2011): 748-769.
3. Jin, Xin, Ram Krishnan, and Ravi Sandhu. "A unified attribute-based access control model covering DAC, MAC and RBAC." Data and
applications security and privacy XXVI. Springer Berlin Heidelberg, 2012. 41-55.
4. Giuri, Luigi, and Pietro Iglio. "Role templates for content-based access control." Proceedings of the second ACM workshop on Role-
based access control. ACM, 1997.
5. Al-Kahtani, Mohammad A., and Ravi Sandhu. "Induced role hierarchies with attribute-based RBAC." Proceedings of the eighth ACM
symposium on Access control models and technologies. ACM, 2003.
6. Ferraiolo, David F., et al. "Proposed NIST standard for role-based access control." ACM Transactions on Information and System
Security (TISSEC) 4.3 (2001): 224-274.
39
References
40. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
11. INCITS, ANSI. "INCITS 359-2004. Role-Based Access Control." American Nat’l Standard for Information Technology (2004).
12. Sandhu, Ravi, David Ferraiolo, and Richard Kuhn. "The NIST model for role-based access control: towards a unified standard." ACM
workshop on Role-based access control. Vol. 2000. 2000.
12. Fuchs, Ludwig, and Günther Pernul. "HyDRo–Hybrid Development of Roles." Information Systems Security. Springer Berlin
Heidelberg, 2008. 287-302.
13. Wang, Lingyu, Duminda Wijesekera, and Sushil Jajodia. "A logic-based framework for attribute based access control." Proceedings of
the 2004 ACM workshop on Formal methods in security engineering. ACM, 2004.
14. Lang, Bo, et al. "A flexible attribute based access control method for grid computing." Journal of Grid Computing 7.2 (2009): 169-180.
15. Covington, Michael J., et al. "Securing context-aware applications using environment roles." Proceedings of the sixth ACM
symposium on Access control models and technologies. ACM, 2001.
16. Hansen, Frode, and Vladimir Oleshchuk. "SRBAC: A spatial role-based access control model for mobile systems." Proceedings of the
7th Nordic Workshop on Secure IT Systems (NORDSEC’03). 2003.
17. Yuan, Eric, and Jin Tong. "Attributed based access control (ABAC) for web services." Web Services, 2005. ICWS 2005. Proceedings.
2005 IEEE International Conference on. IEEE, 2005.
18. Wang, Qihua, et al. "On the correctness criteria of fine-grained access control in relational databases." Proceedings of the 33rd
international conference on Very large data bases. VLDB Endowment, 2007.
19. Fischer, Jeffrey, et al. "Fine-grained access control with object-sensitive roles." ECOOP 2009–Object-Oriented Programming. Springer
Berlin Heidelberg, 2009. 173-194.
40
References
41. Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
20. Fischer, Jeffrey, et al. "Fine-grained access control with object-sensitive roles." ECOOP 2009–Object-Oriented Programming.
Springer Berlin Heidelberg, 2009. 173-194.
21. Tolone, William, et al. "Access control in collaborative systems." ACM Computing Surveys (CSUR) 37.1 (2005): 29-41.
22. Goyal, Vipul, et al. "Attribute-based encryption for fine-grained access control of encrypted data." Proceedings of the 13th
ACM conference on Computer and communications security. ACM, 2006.
23. Al-Muhtadi, Jalal, et al. "Cerberus: a context-aware security scheme for smart spaces." Pervasive Computing and
Communications, 2003.(PerCom 2003). Proceedings of the First IEEE International Conference on. IEEE, 2003.
24. Hulsebosch, R. J., et al. "Context sensitive access control." Proceedings of the tenth ACM symposium on Access control
models and technologies. ACM, 2005.
25. http://www.oxforddictionaries.com/definition/english/context?searchDictCode=all
26. di Vimercati, S. De Capitani, Sara Foresti, and Pierangela Samarati. "Recent advances in access control." Handbook of
Database Security. Springer US, 2008. 1-26.
27. di Vimercati, Sabrina De Capitani, Pierangela Samarati, and Sushil Jajodia. "Policies, models, and languages for access
control." Databases in Networked Information Systems. Springer Berlin Heidelberg, 2005. 225-237.
28. Park, Jaehong, and Ravi Sandhu. "The UCON ABC usage control model." ACM Transactions on Information and System
Security (TISSEC) 7.1 (2004): 128-174.
29. Coyne, Ed, and Timothy R. Weil. "ABAC and RBAC: Scalable, Flexible, and Auditable Access Management." IT Professional 15.3
(2013): 0014-16.
41
References
42. 02/04/15 42
Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Questions ?
43. 02/04/15 43
Department of Computing, School of Electrical
Engineering and Computer Sciences, NUST -
Islamabad
Thank You
Editor's Notes
Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand, like the electricity grid.
Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand, like the electricity grid.
Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand, like the electricity grid.
Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand, like the electricity grid.
Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand, like the electricity grid.
Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand, like the electricity grid.
Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand, like the electricity grid.
Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand, like the electricity grid.