Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 9 SI
Page No. 7032 - 7038

Performance and Divisional Trust and Purpose-Based Access Control for Privacy Preservation

Authors : Mohd Rafiz Salji, Nur Izura Udzir, Mohd Izuan Hafez Ninggal, Nor Fazlida Mohd and Sani Hamidah Ibrahim

References

Bertolissi, C. and M. Fernandez, 2014. A metamodel of access control for distributed environments: Applications and properties. Inf. Comput., 238: 187-207.
Direct Link  |  

Bianchi, E.M.P.G., 2000. Internationalization, its impact and implications on organizational structure: The case of oxiteno. Bus. Manage. Rev. Innovation, 1980: 615-627.
Direct Link  |  

Bruhn, J.G., 2001. Trust and the Health of Organizations. Springer, New York, USA., ISBN:0-306-47265-1, Pages:219.

Byun, J.W. and N. Li, 2008. Purpose based access control for privacy protection in relational database systems. VLDB. J., 17: 603-619.
CrossRef  |  Direct Link  |  

Crampton, J. and J. Sellwood, 2014. Path conditions and principal matching: A new approach to access control. Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, June 25-27, 2014, ACM, New York, USA., ISBN:978-1-4503-2939-2, pp: 187-198.

Ghani, N.A., 2013. Credential purpose-based access control for personal data protection in web-based applications. Ph.D Thesis, University of Technology, Johor Bahru, Malaysia.

Gollmann, D., 2011. From access control to trust management and back-a petition. Proceedings of the 5th IFIP International Conference on Trust Management, June 29-July 1, 2011, Springer, Copenhagen, Denmark, pp: 1-8.

Hung, P.C., 2005. Towards a Privacy Access Control Model for E-Healthcare Services. University of Ontario, Oshawa, Ontario,.

Kabir, M.E. and H. Wang, 2009. Conditional purpose based access control model for privacy protection. Proceedings of the 20th Australasian Conference on Australasian Database, January 01-01, 2009, ACM, Wellington, New Zealand, ISBN: 978-1-920682-73-6, pp: 135-142.

Kabir, M.E., H. Wang and E. Bertino, 2011. A conditional purpose-based access control model with dynamic roles. Expert Syst. Appl., 38: 1482-1489.
Direct Link  |  

Kabir, M.E., H. Wang and E. Bertino, 2012. A role-involved purpose-based access control model. Inf. Syst. Front., 14: 809-822.
CrossRef  |  Direct Link  |  

Kayes, A.S.M., J. Han and A. Colman, 2013. A semantic policy framework for context-aware access control applications. Proceeding of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), July 16-18, 2013, IEEE, Hawthorn, Australia, ISBN:978-0-7695-5022-0, pp: 753-762.

Lazouski, A., F. Martinelli and P. Mori, 2010. Usage control in computer security: A survey. Comput. Sci. Rev., 4: 81-99.
Direct Link  |  

Li, M., X. Sun, H. Wang and Y. Zhang, 2012. Multi-level delegations with trust management in access control systems. J. Intell. Inf. Syst., 39: 611-626.
CrossRef  |  Direct Link  |  

Lunenburg, F.C., 2010. The management function of principals. National Forum Educ. Administration Supervision J., 27: 4-10.
Direct Link  |  

Mirabi, M., H. Ibrahim, A. Mamat and N.I. Udzir, 2011. Integrating Access Control Mechanism with EXEL Labeling Scheme for XML Document Updating. In: Networked Digital Technologies, Fong, S. (Ed.). Springer, Berlin, Germany, ISBN:978-3-642-22184-2, pp: 24-36.

Mosweunyane, G., T. Zuva and K.G. Dibetso, 2005. Using VLANS to revolutionalize the organizational structure. Proceedings of the 35th Conference on of SACLA, July 3-6, 2005, University of Botswana, Kasane, Botswana, pp: 69-290.

Rehman, H., 2008. Occupational stress and a functional area of an organization. Int. Rev. Bus. Res. Pap., 4: 163-173.
Direct Link  |  

Ruj, S., M. Stojmenovic and A. Nayak, 2012. Privacy preserving access control with authentication for securing data in clouds. Proceeding of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), May13-16, 2012, IEEE, Ontario, Canada, ISBN:978-1-4673-1395-7, pp: 556-563.

Samarati, P., 2001. Protecting respondents identities in microdata release. Trans. Knowledge Data Eng., 13: 1010-1027.
CrossRef  |  

Sandhu, R., D. Ferraiolo and R. Kuhn, 2000. The NIST model for role-based access control: Towards a unified standard. Proceedings of the ACM workshop on Role-Based Access Control Vol. 2000, July 26-28, 2000, ACM, Berlin, Germany, ISBN:1-58113-259-X, pp: 1-11.

Sarrouh, N., 2013. Formal modeling of trust-based access control in dynamic coalitions. Proceedings of the 2013 IEEE 37th Annual Conference and Workshops on Computer Software and Applications (COMPSACW), July 22-26, 2013, IEEE, Japan, ISBN:978-1-4799-2160-7, pp: 224-229.

Sun, L. and H. Wang, 2012. A purposeā€based access control in native XML databases. Experience, 24: 1154-1166.
CrossRef  |  Direct Link  |  

Sun, L., H. Wang, R. Jururajin and S. Sriprakash, 2010. A purpose based access control in XML databases system. Proceeding of the 2010 4th International Conference on Network and System Security (NSS), September 1-3, 2010, IEEE, New York, USA., ISBN:978-1-4244-8484-3, pp: 486-493.

Theodore, J.D., 2011. Organizational size: A key element in the development of private enterprises in the less developed countries: The case of ecuador. Int. Bus. Econ. Res. J. IBER., Vol. 8,

Toahchoodee, M., R. Abdunabi, I. Ray and I. Ray, 2009. A trust-based access control model for pervasive computing applications. Proceedings of the IFIP Annual Conference on Data and Applications Security and Privacy, July 12-15, 2009, Springer, Montreal, Canada, pp: 307-314.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved