CFP last date
20 May 2024
Reseach Article

Review of Context Aware Access Control Approaches on Web Data

by Rajni Baghla, Rekha Bhatia
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 147 - Number 9
Year of Publication: 2016
Authors: Rajni Baghla, Rekha Bhatia
10.5120/ijca2016911168

Rajni Baghla, Rekha Bhatia . Review of Context Aware Access Control Approaches on Web Data. International Journal of Computer Applications. 147, 9 ( Aug 2016), 5-9. DOI=10.5120/ijca2016911168

@article{ 10.5120/ijca2016911168,
author = { Rajni Baghla, Rekha Bhatia },
title = { Review of Context Aware Access Control Approaches on Web Data },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 147 },
number = { 9 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 5-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume147/number9/25679-2016911168/ },
doi = { 10.5120/ijca2016911168 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:51:25.356937+05:30
%A Rajni Baghla
%A Rekha Bhatia
%T Review of Context Aware Access Control Approaches on Web Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 147
%N 9
%P 5-9
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The 21st century is the age of netizens. Internet has become a source of knowledge and platform for social media. Social networking sites have gained huge momentum among all age groups and the popularity has attracted users to devote hours on social networking and contributing to a huge repository of information at every minute. Privacy of this information becomes a critical function of the database. Since personal information of the user is subject to cyber crimes therefore, database level privacy is a fundamental requirement to protect the data. The rapid growth of web on the basis of applications and information system have farther expanded the risk exposure of databases and therefore, nowadays data protection is more important than previous. It is more significant to safeguard data not only from external intruders but also internal intruders. In this paper the various access control scheme and its models to attain the confidentiality, integrity and possibility of objectives of database security in the organization are discussed.

References
  1. Kolovski, V., Hendler, J., & Parsia, B. (2007, May). Analyzing web access control policies. In Proceedings of the 16th international conference on World Wide Web (pp. 677-686). ACM.
  2. Garrison III, W. C., Shull, A., Myers, S., & Lee, A. J. On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.
  3. Bates, A., Butler, K. R., & Moyer, T. (2015). Take only what you need: leveraging mandatory access control policy to reduce provenance storage costs. In 7th USENIX Workshop on the Theory and Practice of Provenance (TaPP 15).
  4. Shaikh, R. A., Adi, K., & Logrippo, L. (2016). A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets. International Journal of Information Security, 1-23.
  5. Ye, X. (2016). Privacy preserving and delegated access control for cloud applications. Tsinghua Science and Technology, 21(01), 40-54.
  6. Biswas, P., Sandhu, R., & Krishnan, R. (2016, March). Label-Based Access Control: An ABAC Model with Enumerated Authorization Policy. InProceedings of the 2016 ACM International Workshop on Attribute Based Access Control (pp. 1-12). ACM.
  7. Bhatia, R., & Singh, M. (2016). An Implementation Model for Privacy Aware Access Control in Web Services Environment. In Proceedings of International Conference on ICT for Sustainable Development (pp. 475-484). Springer Singapore.
  8. Rezaeibagha, F., & Mu, Y. (2016). Distributed clinical data sharing via dynamic access-control policy transformation. International Journal of Medical Informatics, 89, 25-31.
Index Terms

Computer Science
Information Sciences

Keywords

Privacy access control web Xml ontology