3 research outputs found

    Enhanced Context-Aware Role-Based Access Control Framework for Pervasive Environment

    Get PDF
    Utilization of contextual information considered very useful for improving access decision making process against systems resources, to be more effective in providing authorized service for a large number of end users.We selected model makes decisions based on context information sensed and collected from user environment. Then we enhanced context utilization and framework performance based on theoretical idea previously published [14], through studying the process of making decision based on context information validity. We focused on enhancing the distributing and management process of context information over users by using the proxy, which works as observer to enforce policy for short term context information. In case of any change, breaks access control policy rules, the proxy on user device will automatically send revocation/grant request based on change made for context information related to the user in his local environment. After the change made to context information listed within the available policy rules, the proxy will re-evaluate it on user device, and utilize available resources on the device, then grant or revoke permissions, finally will update the web service to be up-to-date. Such enhancement will highly increase system responsiveness and enhance authorization for end users.

    An Efficient Approach for Supporting Multi-Tenancy Schema Inheritance in RDBMS for SaaS

    No full text
    Multi-tenancy refers to a principle in software architecture where a single instance of the software runs on a server, serving multiple client organizations (tenants). Common practice is to map multiple singletenant logical schemas in the application to one multi-tenant physical schema in the database. Such mappings are challenging to create. This is due to the flexibility of base scheme to be extended by enterprise application tenants which provides different dynamically modified versions of the application. The fundamental limitation on scalability of this approach is the number of tables of database can handle. Shared Tables Shared Instances (STSI) is a state-of-the-art approach to design the schema. However, they suffer from poor performance and high space overhead. In this paper, we propose an efficient approach for supporting multi-tenancy schema inheritance. We trade-off STSI and our approach. Experimental results show that our method achieves good scalability and high performance with low space requirement, and outperforms STSI methods at different rates depending on DML operations

    Malware Detection Based on Permissions on Android Platform Using Data Mining

    Get PDF
    With the spreading of smart mobile devices to nearly every person, Android Operating System is dominating the mobile’s operating systems. Due to the weak policy of submitting application to Google Play store, attackers developed malware to attack the users of the Android operating system with malware application or by including malicious code into applications. Researchers have been done in this area, but solutions required installing the applications to monitor the malware behavior, or by taking actions after installing the application .We proposed a new method using Data Mining to detect newly and unknown malware using the applications’ permissions as base features. In order to create binary dataset we collected up to “103” benign and malware android app samples, the dataset consist of five different features collected based on different number of attributes and conditions. Different evaluation measure used to evaluate the proposed method, the results show that we achieved 96.74% with f-measure and 0.993 with area under the ROC curve
    corecore