Access Control Concept - Explore the Science & Experts | ideXlab

Scan Science and Technology

Contact Leading Edge Experts & Companies

Access Control Concept

The Experts below are selected from a list of 24519 Experts worldwide ranked by ideXlab platform

Access Control Concept – Free Register to Access Experts & Abstracts

Seog Park – One of the best experts on this subject based on the ideXlab platform.

  • the work Concept rbac model for the Access Control of the distributed web server environment
    Web Intelligence, 2001
    Co-Authors: Won Bo Shim, Seog Park
    Abstract:

    Role Based Access Control method, the most suitable Access Control Concept available today in a distributed web server system within a domain, will be applied in this paper to suggest a solution to the situation of being asked to follow the verification process from each server when Accessing multiple web servers while working on the task. Work Concept that is higher, more abstract, and more inclusive Concept than Role will be imported to the existing RBAC so that the user could select Work instead of Role when doing one’s work which then leads to the way to complete the work more efficiently using the right provided by each server based on the selected Work.

  • Web Intelligence – The Work Concept RBAC Model for the Access Control of the Distributed Web Server Environment
    Web Intelligence: Research and Development, 2001
    Co-Authors: Won Bo Shim, Seog Park
    Abstract:

    Role Based Access Control method, the most suitable Access Control Concept available today in a distributed web server system within a domain, will be applied in this paper to suggest a solution to the situation of being asked to follow the verification process from each server when Accessing multiple web servers while working on the task. Work Concept that is higher, more abstract, and more inclusive Concept than Role will be imported to the existing RBAC so that the user could select Work instead of Role when doing one’s work which then leads to the way to complete the work more efficiently using the right provided by each server based on the selected Work.

  • implementing web Access Control system for the multiple web servers in the same domain using rbac Concept
    International Conference on Parallel and Distributed Systems, 2001
    Co-Authors: Won Bo Shim, Seog Park
    Abstract:

    As the Web server based system is being used more and more, having separate Web servers for each task to distribute the Web server’s load are gaining much more popularity over having one main Web server to process all the tasks. When the user tries to Access each Web server that contains a number of Web documents that are linked to each other via hyper-links within the domain, each Web server asks the user to follow the verification process even though the user is identical, and this prohibits the user from using the system efficiently. The role based Access Control method, which is the most suitable Access Control Concept available now for the distributed Web server based system within the domain, is used in this paper. Additionally the method for Controlling the level of Web document contents available to the user based on the user’s Access permission rights is introduced to reduce the granularity of the document content Access.

Timo D Hamalainen – One of the best experts on this subject based on the ideXlab platform.

  • multicast Access Control Concept for xdsl customers
    Consumer Communications and Networking Conference, 2006
    Co-Authors: O Karppinen, O Alanen, Timo D Hamalainen
    Abstract:

    Multicast is a tempting possibility for many broad- band services. It makes possible to deliver one data-stream to several receivers simultaneously. IP-Multicast is based on an open group Concept. This means that it is possible for all the users to join the group and thus receive the data. The open Concept is also the main reason why multicast has not been taken in wider use. There is two different solution to solve this problem, group Access Control and multicast data encryption. Group Access Control mechanisms focuses on restricting the group membership at the users edge device. Traffic encryption scheme relies on end-to-end encryption, so a key management architecture is also needed. We introduce our own proposal for a multicast group Access Control mechanism. Our mechanism consists of user authentication and dynamic Access Control list configuration. Our proposal is protocol independent and thus easy to take in use in various content delivery network environments.

  • CCNC – Multicast Access Control Concept for xDSL-customers
    CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference 2006., 1
    Co-Authors: O Karppinen, O Alanen, Timo D Hamalainen
    Abstract:

    Multicast is a tempting possibility for many broad- band services. It makes possible to deliver one data-stream to several receivers simultaneously. IP-Multicast is based on an open group Concept. This means that it is possible for all the users to join the group and thus receive the data. The open Concept is also the main reason why multicast has not been taken in wider use. There is two different solution to solve this problem, group Access Control and multicast data encryption. Group Access Control mechanisms focuses on restricting the group membership at the users edge device. Traffic encryption scheme relies on end-to-end encryption, so a key management architecture is also needed. We introduce our own proposal for a multicast group Access Control mechanism. Our mechanism consists of user authentication and dynamic Access Control list configuration. Our proposal is protocol independent and thus easy to take in use in various content delivery network environments.

Won Bo Shim – One of the best experts on this subject based on the ideXlab platform.

  • the work Concept rbac model for the Access Control of the distributed web server environment
    Web Intelligence, 2001
    Co-Authors: Won Bo Shim, Seog Park
    Abstract:

    Role Based Access Control method, the most suitable Access Control Concept available today in a distributed web server system within a domain, will be applied in this paper to suggest a solution to the situation of being asked to follow the verification process from each server when Accessing multiple web servers while working on the task. Work Concept that is higher, more abstract, and more inclusive Concept than Role will be imported to the existing RBAC so that the user could select Work instead of Role when doing one’s work which then leads to the way to complete the work more efficiently using the right provided by each server based on the selected Work.

  • Web Intelligence – The Work Concept RBAC Model for the Access Control of the Distributed Web Server Environment
    Web Intelligence: Research and Development, 2001
    Co-Authors: Won Bo Shim, Seog Park
    Abstract:

    Role Based Access Control method, the most suitable Access Control Concept available today in a distributed web server system within a domain, will be applied in this paper to suggest a solution to the situation of being asked to follow the verification process from each server when Accessing multiple web servers while working on the task. Work Concept that is higher, more abstract, and more inclusive Concept than Role will be imported to the existing RBAC so that the user could select Work instead of Role when doing one’s work which then leads to the way to complete the work more efficiently using the right provided by each server based on the selected Work.

  • implementing web Access Control system for the multiple web servers in the same domain using rbac Concept
    International Conference on Parallel and Distributed Systems, 2001
    Co-Authors: Won Bo Shim, Seog Park
    Abstract:

    As the Web server based system is being used more and more, having separate Web servers for each task to distribute the Web server’s load are gaining much more popularity over having one main Web server to process all the tasks. When the user tries to Access each Web server that contains a number of Web documents that are linked to each other via hyper-links within the domain, each Web server asks the user to follow the verification process even though the user is identical, and this prohibits the user from using the system efficiently. The role based Access Control method, which is the most suitable Access Control Concept available now for the distributed Web server based system within the domain, is used in this paper. Additionally the method for Controlling the level of Web document contents available to the user based on the user’s Access permission rights is introduced to reduce the granularity of the document content Access.