Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- ABAC (1)
- Access Control (1)
- Access control model (1)
- Attribute-Based Access Control (1)
- Business Intelligence and Data Warehouse (1)
-
- Data Masking (1)
- Data Security and Anonymization (1)
- Delegation (1)
- Document database (1)
- HGAA (1)
- HGABAC (1)
- Health Data Privacy (1)
- Hierarchical Group Attribute Architecture (1)
- Hierarchical Group and Attribute-Based Access Control (1)
- Hierarchy (1)
- NoSQL (1)
- RBAC (1)
- Security (1)
- Software Framework (1)
Articles 1 - 3 of 3
Full-Text Articles in Information Security
Hierarchical Group And Attribute-Based Access Control: Incorporating Hierarchical Groups And Delegation Into Attribute-Based Access Control, Daniel Servos
Electronic Thesis and Dissertation Repository
Attribute-Based Access Control (ABAC) is a promising alternative to traditional models of access control (i.e. Discretionary Access Control (DAC), Mandatory Access Control (MAC) and Role-Based Access control (RBAC)) that has drawn attention in both recent academic literature and industry application. However, formalization of a foundational model of ABAC and large-scale adoption is still in its infancy. The relatively recent popularity of ABAC still leaves a number of problems unexplored. Issues like delegation, administration, auditability, scalability, hierarchical representations, etc. have been largely ignored or left to future work. This thesis seeks to aid in the adoption of ABAC by filling in …
Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali
Electronic Thesis and Dissertation Repository
The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify, Map, Apply, …
An Access Control Model For Nosql Databases, Motahera Shermin
An Access Control Model For Nosql Databases, Motahera Shermin
Electronic Thesis and Dissertation Repository
Current development platforms are web scale, unlike recent platforms which were just network scale. There has been a rapid evolution in computing paradigm that has created the need for data storage as agile and scalable as the applications they support. Relational databases with their joins and locks influence performance in web scale systems negatively. Thus, various types of non-relational databases have emerged in recent years, commonly referred to as NoSQL databases. To fulfill the gaps created by their relational counter-part, they trade consistency and security for performance and scalability. With NoSQL databases being adopted by an increasing number of organizations, …