Loading...
Search for: access-control
0.005 seconds
Total 139 records

    Enforcing access control policies over data stored on untrusted server

    , Article 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, 6 September 2017 through 7 September 2017 ; 2018 , Pages 54-57 ; 9781538665602 (ISBN) Soltani, N ; Jalili, R ; Sharif University of Technology
    Abstract
    One of the security issues in data outsourcing scenario is the enforcement of data owner's access control policies. This includes some challenges; namely, the number of keys required to access authorized resources, efficient policy updating, write access control enforcement, user and data owner overhead, and preserving confidentiality of data and policies. Most of the existing solutions address only some of the challenges, while they impose high overhead on both the data owner and users. Though, policy management in the Role-Based Access Control (RBAC) model is easier and more efficient due to the existence of role hierarchical structure and role inheritance; most of the existing solutions... 

    Access control aware data retrieval for secret sharing based database outsourcing

    , Article Distributed and Parallel Databases ; Volume 34, Issue 4 , Dec , 2015 , pp 505–534 ; 09268782 (ISSN) Hadavi, M. A ; Jalili, R ; Karimi, L ; Sharif University of Technology
    Kluwer Academic Publishers  2015
    Abstract
    Enforcing dynamic and confidential access control policies is a challenging issue of data outsourcing to external servers due to the lack of trust towards the servers. In this paper, we propose a scalable yet flexible access control enforcement mechanism when the underlying relational data, on which access policies are defined, has been shared through a secret sharing scheme. For sharing values of an attribute in a relation, the attribute is assigned a secret distribution key and its values are split and distributed among data servers according to a Shamir based secret sharing scheme. Given access control policies over attributes of the relation schema, access to distribution keys, used... 

    Access control aware data retrieval for secret sharing based database outsourcing

    , Article Distributed and Parallel Databases ; Volume 34, Issue 4 , 2016 , Pages 505-534 ; 09268782 (ISSN) Hadavi, M. A ; Jalili, R ; Karimi, L ; Sharif University of Technology
    Springer New York LLC  2016
    Abstract
    Enforcing dynamic and confidential access control policies is a challenging issue of data outsourcing to external servers due to the lack of trust towards the servers. In this paper, we propose a scalable yet flexible access control enforcement mechanism when the underlying relational data, on which access policies are defined, has been shared through a secret sharing scheme. For sharing values of an attribute in a relation, the attribute is assigned a secret distribution key and its values are split and distributed among data servers according to a Shamir based secret sharing scheme. Given access control policies over attributes of the relation schema, access to distribution keys, used... 

    Context-aware provisional access control

    , Article 2nd International Conference on Information Systems Security, ICISS 2006, 19 December 2006 through 21 December 2006 ; Volume 4332 LNCS , 2006 , Pages 132-146 ; 03029743 (ISSN); 9783540689621 (ISBN) Masoumzadeh, A. R ; Amini, M ; Jalili, R ; Sharif University of Technology
    Springer Verlag  2006
    Abstract
    High heterogeneity and dynamicity of pervasive computing environments introduces requirement of more flexible and functional access control policies. The notion of provisional actions has been defined previously to overcome the insufficient grant/denial response to an access request and has been incorporated in the provision-based access controlmodel(PBAC).BasedonPBAC,weproposeacontext-aware provision-based access control model, capable of dynamic adaptation of access control policy according to the changing context. In particular, the model facilitates the definition of context-aware policies and enriches the access control by enforcing provisional actions in addition to common permissions.... 

    A periodic jump-based rendezvous algorithm in cognitive radio networks

    , Article Computer Communications ; Volume 79, 1 , April , 2016 , Pages 66–77 ; 01403664 (ISSN) Salehkaleybar, S ; Pakravan, M. R ; Sharif University of Technology
    Elsevier  2016
    Abstract
    An important issue in designing multichannel MAC protocols for Opportunistic Spectrum Access (OSA) is the synchronization between Secondary Users (SUs). Synchronization can be performed in two phases: the initial handshaking, and then the synchronous hopping across available channels. In this paper, we address the problem of initial handshaking through the approach called "blind rendezvous". We first introduce a role-based solution by constructing two channel hopping sequences. The secondary transmitter and receiver jump across channels according to these two sequences. The proposed algorithm guarantees rendezvous in at most (C+1)2 time slots (where C is the number of channels) and two SUs... 

    A context-aware access control model for pervasive computing environments

    , Article 2007 International Conference on Intelligent Pervasive Computing, IPC 2007, Jeju Island, 11 October 2007 through 13 October 2007 ; 2007 , Pages 51-56 ; 0769530060 (ISBN); 9780769530062 (ISBN) Emami, S. S ; Amini, M ; Zokaei, S ; Sharif University of Technology
    2007
    Abstract
    In pervasive computing environments, a user can access resources and services from any where and at any time; thus a key security challenge in these environments is the design of an effective access control model which is aware of context modifications. Changes in context may trigger changes in authorizations. In this paper, we propose a new context-aware access control model based on role-based access control model for pervasive computing environments. We assign roles to users dynamically based on the long-term context information and tune active role's permissions according to the short-term context information of the users and environment. © 2007 IEEE  

    A dynamic mandatory access control model

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 862-866 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Haadi Jafarian, J ; Amini, M ; Jalili, R ; Sharif University of Technology
    2008
    Abstract
    Mandatory access control has traditionally been employed as a robust security mechanism in critical environments like military ones. As computing technology becomes more pervasive and mobile services are deployed, applications will need flexible access control mechanisms. Aggregating mandatory models with context-awareness would provide us with essential means to define dynamic policies needed in critical environments. In this paper, we introduce a dynamic context-aware mandatory access control model which enables us to specify dynamic confidentiality and integrity policies using contextual constraints. © 2008 Springer-Verlag  

    Access control enforcement on outsourced data ensuring privacy of access control policies

    , Article Proceedings of the 2011 International Conference on High Performance Computing and Simulation, HPCS 2011, 4 July 2011 through 8 July 2011, Istanbul ; 2011 , Pages 491-497 ; 9781612843810 (ISBN) Tourani, P ; Hadavi, M. A ; Jalili, R ; Sharif University of Technology
    2011
    Abstract
    Nowadays, data outsourcing has become a solution for many organizations especially large scale enterprises due to the high costs of in-house management of the rapidly growing data. Among all security requirements in this context, user access control and its following dynamic changes are of interest. In this paper, we propose an efficient and reliable mechanism to solve this problem in owner-write-users-read applications. A novel solution is introduced to enforce access control on outsourced data using the Chinese Remainder Theorem. The solution allows updating policy changes at a limited cost in terms of both computational power and the number of users' secret keys. Although the server, on... 

    Overview of MAC protocols for energy harvesting wireless sensor networks

    , Article IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 30 August 2015 through 2 September 2015 ; Volume 2015-December , 2015 , Pages 2032-2037 ; 9781467367820 (ISBN) Ramezani, P ; Pakravan, M. R ; Sharif University of Technology
    Abstract
    Wireless Sensor Networks (WSNs) have been weaved into the fabric of our daily lives. The foremost impediment in the rapid development of these networks is the energy limitation which inhibits them from meeting specific application requirements. Recently, the advances in energy harvesting technology have made it possible to replenish the energy of sensors via external sources. Energy Harvesting-Wireless Sensor Networks (EH-WSNs) are being transformed from a visionary concept into reality. However, this concept is still in its infancy and calls for extensive research to cater to the needs of WSNs. For future progress of EH-WSNs, Medium Access Control (MAC) layer has undoubtedly a decisive role... 

    A semantic-based access control mechanism using semantic technologies

    , Article SIN'09 - Proceedings of the 2nd International Conference on Security of Information and Networks, 6 October 2009 through 10 October 2009, Famagusta ; 2009 , Pages 258-267 ; 9781605584126 (ISBN) Ehsan, M. A ; Amini, M ; Jalili, R ; Taganrog Inst. Technol. South. Fed. Univ.; Russian Foundation for Basic Research; Int. Counc. Electron. Commer. Consult. (EC-Counc.); Kordon Ltd.; World Scientific Publishing (UK) Ltd ; Sharif University of Technology
    2009
    Abstract
    In order to overcome the shortcomings of the recent frameworks and mechanisms for semantic-based access control, this paper presents a semantic-based, context-aware, and multi-domain enabled framework implementing a semantic-based access control mechanism for Semantic Web. The access control framework is based on the MA(DL)2 model, which takes the semantic relationships among different entities into account. The framework handles the Semantic Web context by classifying and representing it through an ontology. Considering the MA(DL)2 model, the framework assumes SemanticWeb having some overlapped domains, which each contains an authority and a security agent. As a domain authority... 

    Attribute-based fine-grained access control for outscored private set intersection computation

    , Article Information Sciences ; Volume 536 , 2020 , Pages 222-243 Ali, M ; Mohajeri, J ; Sadeghi, M. R ; Liu, X ; Sharif University of Technology
    Elsevier Inc  2020
    Abstract
    Private set intersection (PSI) is a fundamental cryptographic protocol which has a wide range of applications. It enables two clients to compute the intersection of their private datasets without revealing non-matching elements. The advent of cloud computing drives the ambition to reduce computation and data management overhead by outsourcing such computations. However, since the cloud is not trustworthy, some cryptographic methods should be applied to maintain the confidentiality of datasets. But, in doing so, data owners may be excluded from access control on their outsourced datasets. Therefore, to control access rights and to interact with authorized users, they have to be online during... 

    CEBAC: A decentralized cooperation enforcement based access control framework in MANETs

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 427-434 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Saremi, F ; Mashayekhi, H ; Movaghar, A ; Jalili, R ; Sharif University of Technology
    2008
    Abstract
    Prevention of unauthorized access to services in mobile ad hoc networks is a more sophisticated problem than access control in other networks, due to interconnection facilities and lack of any fixed network infrastructure in such networks. Therefore regarding the nature of these networks, controlling access to services should be in a decentralized manner providing good performance and preserving network security. In this paper, we propose a decentralized Cooperation Enforcement Based Access Control (CEBAC) framework for mobile ad hoc networks. CEBAC comprises several groups of Service Authorizers, each issuing Credentials for access to a specific kind of services. The User Authorization for... 

    Design and Implementation of an Access Control Mechanism Based on SBAC

    , M.Sc. Thesis Sharif University of Technology Ehsan, Amir Mousa (Author) ; Jalili, Rasoul (Supervisor)
    Abstract
    In order to control accesses in semantic environments, a semantic-based access control and policy specification language should be choosen. Upon to them, some security mechanisms should be designed and implemented. Several access control models and policy specification languages have been arisen, but seldom have focused on designing mechanisms to satisfy their models in any environment. In this thesis, we focus on implementation aspects of access control in semantic environments. We chose semantic web as our studying environment and an extension of the SBAC model named MA(DL)2 as our access control model. To control accesses in the selected environment, we divide semantic web into some... 

    Reliability of separation of duty in ANSI standard role-based access control

    , Article Scientia Iranica ; Volume 18, Issue 6 , 2011 , Pages 1416-1424 ; 10263098 (ISSN) Esna Ashari, M ; Rabiee, H. R ; Mirian-Hosseinabadi, S. H ; Sharif University of Technology
    Abstract
    ANSI RBAC is a standard for a consistent and uniform definition on Role Based Access Control features and their functional specifications ANSI (2004) [1]. We analyze both static and dynamic separation of duty constraints specifications in the ANSI RBAC standard and evaluate their reliabilities. We then suggest necessary improvements for making them completely reliable  

    TIRIAC: A trust-driven risk-aware access control framework for Grid environments

    , Article Future Generation Computer Systems ; Volume 55 , 2016 , Pages 238-254 ; 0167739X (ISSN) Dorri Nogoorani, S ; Jalili, R ; Sharif University of Technology
    Elsevier 
    Abstract
    The infrastructure provided by a Grid enables researchers to collaboratively solve various research problems through sharing their resources and establishing virtual organizations (VOs). However, the distributed and dynamic nature of a Grid VO is a challenge for access control systems. All users in a VO have responsibilities which correspond to their rights. While they should be able to make use of all VO resources, irresponsibility and permission misuse (insider attack) impose costs and losses on the affected resources. Hence, the history of users' behavior and the possibility of misuse need to be considered in the resource providers' risk management process. In this paper, we propose the... 

    A temporal description logic based access control model for expressing history constrained policies in semantic web

    , Article Proceedings - 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2009, 20 July 2009 through 22 July 2009, London ; 2009 , Pages 142-149 ; 9780769537429 (ISBN) Faghih, F ; Amini, M ; Jalili, R ; Sharif University of Technology
    2009
    Abstract
    An access control model for Semantic Web should be compatible with the corresponding semantic model. The access control procedure(s) should also take the semantic relationships between the entities (specified as ontologies) into account. Considering the benefits of logic-based models and the description logic foundation of Semantic Web, in this paper, we propose an access control model based on a temporal variant of description logics (TL-ALCF). This logical schema enables us to express history constrained policies to enrich the policy-base with dynamic properties based on previous accesses. The specification of each component of the model as well as the approach to define history... 

    Handling context in a semantic-based access control framework

    , Article Proceedings - International Conference on Advanced Information Networking and Applications, AINA, 26 May 2009 through 29 May 2009, Bradford ; 2009 , Pages 103-108 ; 1550445X (ISSN); 9780769536392 (ISBN) Ehsan, M. A ; Amini, M ; Jalili, R ; IEEE Computer Society ; Sharif University of Technology
    2009
    Abstract
    As semantic web grows, security concerns increase. One concern is controlling accesses to resources in this environment. In order to infer whether the access is allowed or not, different information of different entities including contextual information should be involved. From access control point of view, we divide the entities in semantic web into three categories: resources (objects), requesters (subjects), and environment (infrastructure, time, and location). In this paper, we present a semantic-based context-aware access control framework to be applied in semantic web, considered as a multi-domain environment. To handle context information in the framework, we propose a context... 

    Analysis of Non-monotonicity Property in Access Control for Pervasive Computing Environment

    , M.Sc. Thesis Sharif University of Technology Javadi, Ahmad (Author) ; Jalili, Rasoul (Supervisor)
    Abstract
    Access control, which is the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied, plays an important role in the system security. The existing of non-monotonicity property in a deduction and decision making process means that some of the previous deductions or decisions may be retracted by adding new information and premises. Based on the definition, in a non-monotonic access control system, adding new information or access control rules may invalidate some of the previous conclusions (permissions/prohibitions). The requirements such as decision making based on the imperfect information, supporting... 

    Missing a trusted reference monitor: How to enforce confidential and dynamic access policies?

    , Article Communications in Computer and Information Science ; Vol. 428, issue , Oct , 2014 , p. 92-104 ; ISSN: 18650929 ; ISBN: 978-3319109022 Karimi, L ; Javadi, S. A ; Hadavi, M. A ; Jalili1, R ; Sharif University of Technology
    Abstract
    Popularity of data outsourcing and its consequent access control issues such as dynamism and efficiency is the main motivation of this paper. Existing solutions suffer from the potential unlimited number of user keys, inefficient update of policies, and disclosure of data owner’s access control policies. Using Chinese remainder theorem and proxy re-encryption together, in this paper, we propose an efficient access control enforcement mechanism based on selective encryption that addresses all the shortages. The overall architecture, required algorithms, and access control policy update are discussed. The mechanism is evaluated through simulation and, the given results are satisfactory  

    Authentication phase of security bootstrapping in the internet of things networks based on a trusted zone

    , Article Journal of Scientific and Industrial Research ; Volume 78, Issue 11 , 2019 , Pages 751-754 ; 00224456 (ISSN) Nazemi, N ; Manzuri, M. T ; Sharif University of Technology
    Scientific Publishers  2019
    Abstract
    Internet of Things (IoT) represents enabling all things in such a smart way that those things be accessed any time and anywhere through the Internet. Presence of IoT as a novel way of networking, opens up new concernsaround the communication and network world. A secure establishing in such a diffused network is a great concerns of the researchers. Due to Smart things' resource-constraints and power-limitation the former ways of securing networks cannot be applicable in IoT. Thus, security bootstrapping has introduced a solution for establishing security in the first instance of deploying the network. In this study, we have proposed a security bootstrapping solution which can be applied in...