Matematik ve Bilgisayar Bölümü / Department of Mathematics and Computer Science
Permanent URI for this collectionhttps://hdl.handle.net/11413/6787
Browse
Browsing Matematik ve Bilgisayar Bölümü / Department of Mathematics and Computer Science by Subject "Access Control"
Now showing 1 - 3 of 3
- Results Per Page
- Sort Options
Publication Metadata only Design of a lattice-based access control scheme(IEEE, 345 E 47th St, New York, Ny 10017 USA, 2009) Demirer, Rüştü Murat; Chiang, Chia-Chu; Bayrak, Coşkun; Şeker, Remzi; Topaloğlu, Ümit; Samadi, Nasrola; Tek, Süleyman; Jiang, Bian; Zhou, GuangXu; Wang, Xiaoran; 141152; 6194Publication Metadata only Enable delegation for RBAC with secure authorization certificate(Elsevier Advanced Technology, Oxford Fulfillment Centre The Boulevard, Langford Lane, Kidlington, Oxford Ox5 1Gb, Oxon, England, 2011-11) Zhou, GuangXu; Demirer, Murat; Bayrak, Coşkun; Wang, LichengOur motivation in this paper is to explore a Secure Delegation Scheme that could keep access control information hidden through network transmission. This approach introduces the quasirandom structure, 3-Uniform Hypergraph, as the representation structure for authorization information. It generates a Secure Authorization Certificate (SAC) in place of an Attribute Certificate (AC) to enable both Role-based Access Control (RBAC) and a delegation process for hiding authorization information. We have two contributions in this regard: (1) a value-based delegation scheme and (2) a pattern-based RBAC. A Secure Delegation Scheme is based on the hashing values generated with the quasirandom structure. With this scheme, the delegation process will greatly reduce the risk of sensitive authorization information leakage for applications. In the case of pattern-based access, we introduce a new hash function using quasirandom structure to make a fingerprint(1) for RBAC. The quasirandom structure derived from k-Uniform Hypergraph has measurable uniformity, which is an advantage over traditional hash functions. Another advantage is that it does not need to access the entire message context to generate the fingerprint which is essential for traditional hash functions such as MD5, SHA-1, etc. (C) 2011 Elsevier Ltd. All rights reserved.Publication Embargo Survey on Access Control Mechanisms in Cloud Computing(River Publishers, 2018-05-26) AKBULUT, AKHAN; BAYDOĞMUŞ, GÖZDE KARATAŞ; 110942; 116056The benefits that Internet-based applications and services have given to the end user with today’s cloud computing technology are very remarkable. The distributed services instantly scaled over the Internet provided by cloud computing can be achieved by using some mechanisms in the background. It is a critical task for end users to control access to resources because lack of control often leads to security risks. In addition, this may cause systems to fail. This paper describes seven different access control mechanisms used in cloud computing platforms for different purposes. Besides, the advantages and disadvantages of various models developed from previous service-based architectures and used for cloud computing are detailed and classified. During the assessments, NIST’s metrics were taken as a reference, and in the study, 109 articles from the past decade were examined. We also compared our research with the existing survey papers.