User Access Right

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 6 Experts worldwide ranked by ideXlab platform

Palaniappan Shamala - One of the best experts on this subject based on the ideXlab platform.

  • e store management using bell lapadula Access control security model
    JOIV : International Journal on Informatics Visualization, 2018
    Co-Authors: Saida Nafisah Roslan, Isredza Rahmi A Hamid, Palaniappan Shamala
    Abstract:

    Generally, the existing store management system does not provide any Access control mechanism in order to manage resources. All levels of User have the same Right to Access the store and borrow the equipment. Therefore, the E-Store management system using Bell-LaPadula Access control model was proposed. The prototyping methodology was used to develop the system because methodology model is quickly constructed to test or illustrate design features and ideas, in order to gather User feedback. Moreover, the system is built using hypertext processor (PHP) language. The E-Store system has three types of Users, which are known as top management of Welding Department, lecturers and students. The User’s Access control is divided by high-level privilege to lower-level privilege. Therefore, each User will have different login interface according to their role and Access Right to the system. Through the system, high-level User manages in and out equipment flow, manages authorization, view history log in activity and verify complaint report. Lower-level User can view list of equipment, report complaint and damage equipment and borrow equipment. The E-Store management system is expected to manage the store effectively and reduced redundancy issues of equipment requested. The User Access Right has been assigned based on their Access level.

Saida Nafisah Roslan - One of the best experts on this subject based on the ideXlab platform.

  • e store management using bell lapadula Access control security model
    JOIV : International Journal on Informatics Visualization, 2018
    Co-Authors: Saida Nafisah Roslan, Isredza Rahmi A Hamid, Palaniappan Shamala
    Abstract:

    Generally, the existing store management system does not provide any Access control mechanism in order to manage resources. All levels of User have the same Right to Access the store and borrow the equipment. Therefore, the E-Store management system using Bell-LaPadula Access control model was proposed. The prototyping methodology was used to develop the system because methodology model is quickly constructed to test or illustrate design features and ideas, in order to gather User feedback. Moreover, the system is built using hypertext processor (PHP) language. The E-Store system has three types of Users, which are known as top management of Welding Department, lecturers and students. The User’s Access control is divided by high-level privilege to lower-level privilege. Therefore, each User will have different login interface according to their role and Access Right to the system. Through the system, high-level User manages in and out equipment flow, manages authorization, view history log in activity and verify complaint report. Lower-level User can view list of equipment, report complaint and damage equipment and borrow equipment. The E-Store management system is expected to manage the store effectively and reduced redundancy issues of equipment requested. The User Access Right has been assigned based on their Access level.

Isredza Rahmi A Hamid - One of the best experts on this subject based on the ideXlab platform.

  • e store management using bell lapadula Access control security model
    JOIV : International Journal on Informatics Visualization, 2018
    Co-Authors: Saida Nafisah Roslan, Isredza Rahmi A Hamid, Palaniappan Shamala
    Abstract:

    Generally, the existing store management system does not provide any Access control mechanism in order to manage resources. All levels of User have the same Right to Access the store and borrow the equipment. Therefore, the E-Store management system using Bell-LaPadula Access control model was proposed. The prototyping methodology was used to develop the system because methodology model is quickly constructed to test or illustrate design features and ideas, in order to gather User feedback. Moreover, the system is built using hypertext processor (PHP) language. The E-Store system has three types of Users, which are known as top management of Welding Department, lecturers and students. The User’s Access control is divided by high-level privilege to lower-level privilege. Therefore, each User will have different login interface according to their role and Access Right to the system. Through the system, high-level User manages in and out equipment flow, manages authorization, view history log in activity and verify complaint report. Lower-level User can view list of equipment, report complaint and damage equipment and borrow equipment. The E-Store management system is expected to manage the store effectively and reduced redundancy issues of equipment requested. The User Access Right has been assigned based on their Access level.

State Radu - One of the best experts on this subject based on the ideXlab platform.

  • BlockPGP: A Blockchain-based Framework for PGP Key Servers
    2018
    Co-Authors: Yakubov Alexander, Shbair Wazen, State Radu
    Abstract:

    Pretty Good Privacy (PGP) is one of the most prominent cryptographic standards, offering end-to-end encryption for email messages and other sensitive information. PGP allows to verify the identity of the correspondent in information exchange as well as the information integrity. It implements asymmetric encryption with certificates shared through a network of PGP key servers. Many recent breaches show that certificate infrastructure can be compromised as well as exposed to operational errors. In this paper, we propose a new PGP management framework with the key server infrastructure implemented using blockchain technology. Our framework resolves some problems of PGP key servers focusing in particular on fast propagation of certificate revocation among key servers and elimination of man-in-the-middle risk. We also provided User Access Right control where only the certificate holder can change information related to the certificate. We designed and developed a prototype for key server deployment on permissioned Ethereum blockchain. Permissioned blockchain should allow to control the costs of PGP key server infrastructure maintenance at the present level

Yakubov Alexander - One of the best experts on this subject based on the ideXlab platform.

  • BlockPGP: A Blockchain-based Framework for PGP Key Servers
    2018
    Co-Authors: Yakubov Alexander, Shbair Wazen, State Radu
    Abstract:

    Pretty Good Privacy (PGP) is one of the most prominent cryptographic standards, offering end-to-end encryption for email messages and other sensitive information. PGP allows to verify the identity of the correspondent in information exchange as well as the information integrity. It implements asymmetric encryption with certificates shared through a network of PGP key servers. Many recent breaches show that certificate infrastructure can be compromised as well as exposed to operational errors. In this paper, we propose a new PGP management framework with the key server infrastructure implemented using blockchain technology. Our framework resolves some problems of PGP key servers focusing in particular on fast propagation of certificate revocation among key servers and elimination of man-in-the-middle risk. We also provided User Access Right control where only the certificate holder can change information related to the certificate. We designed and developed a prototype for key server deployment on permissioned Ethereum blockchain. Permissioned blockchain should allow to control the costs of PGP key server infrastructure maintenance at the present level