978 research outputs found
Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service
Database as a service provides services for accessing and managing customers
data which provides ease of access, and the cost is less for these services.
There is a possibility that the DBaaS service provider may not be trusted, and
data may be stored on untrusted server. The access control mechanism can
restrict users from unauthorized access, but in cloud environment access
control policies are more flexible. However, an attacker can gather sensitive
information for a malicious purpose by abusing the privileges as another user
and so database security is compromised. The other problems associated with the
DBaaS are to manage role hierarchy and secure session management for query
transaction in the database. In this paper, a role-based access control for the
multitenant database with role hierarchy is proposed. The query is granted with
least access privileges, and a session key is used for session management. The
proposed work protects data from privilege escalation and SQL injection. It
uses the partial homomorphic encryption (Paillier Encryption) for the
encrypting the sensitive data. If a query is to perform any operation on
sensitive data, then extra permissions are required for accessing sensitive
data. Data confidentiality and integrity are achieved using the role-based
access control with partial homomorphic encryption.Comment: 11 Pages,4 figures, Proceedings of International Conference on ICT
for Sustainable Developmen
Effect of matrix parameters on mesoporous matrix based quantum computation
We present a solid state implementation of quantum computation, which
improves previously proposed optically driven schemes. Our proposal is based on
vertical arrays of quantum dots embedded in a mesoporous material which can be
fabricated with present technology. We study the feasibility of performing
quantum computation with different mesoporous matrices. We analyse which matrix
materials ensure that each individual stack of quantum dots can be considered
isolated from the rest of the ensemble-a key requirement of our scheme. This
requirement is satisfied for all matrix materials for feasible structure
parameters and GaN/AlN based quantum dots. We also show that one dimensional
ensembles substantially improve performances, even of CdSe/CdS based quantum
dots
Mesoporous matrices for quantum computation with improved response through redundance
We present a solid state implementation of quantum computation, which improves previously proposed optically driven schemes. Our proposal is based on vertical arrays of quantum dots embedded in a mesoporous material which can be fabricated with present technology. The redundant encoding typical of the chosen hardware protects the computation against gate errors and the effects of measurement induced noise. The system parameters required for quantum computation applications are calculated for II-VI and III-V materials and found to be within the experimental range. The proposed hardware may help minimize errors due to polydispersity of dot sizes, which is at present one of the main problems in relation to quantum dot-based quantum computation. (c) 2007 American Institute of Physics
Transactions and updates in deductive databases
n this paper we develop a new approach providing a smooth integration of extensional updates and declarative query language for deductive databases. The approach is based on a declarative speci cation of updates in rule bodies. Updates are not executed as soon are evaluated. Instead, they are collectedand then applied to the database when the query evaluation is completed. We call this approach non-immediate update semantics. We provide a top down and equivalent bottom-up semantics which re ect the corresponding computation models. We also package set of updates into transactions and we provide a formal semantics for transactions. Then, in order to handle complex transactions, we extend the transaction language with control constructors still perserving formal semantics and semantics equivalence
Flexible Resolution of Authorisation Conflicts in Distributed Systems
Flexible Resolution of Authorisation Conflicts in Distributed System
FastLAS: scalable inductive logic programming incorporating domain-specific optimisation criteria
Inductive Logic Programming (ILP) systems aim to find a setof logical rules, called a hypothesis, that explain a set of ex-amples. In cases where many such hypotheses exist, ILP sys-tems often bias towards shorter solutions, leading to highlygeneral rules being learned. In some application domains likesecurity and access control policies, this bias may not be de-sirable, as when data is sparse more specific rules that guaran-tee tighter security should be preferred. This paper presents anew general notion of ascoring functionover hypotheses thatallows a user to express domain-specific optimisation criteria.This is incorporated into a new ILP system, calledFastLAS,that takes as input a learning task and a customised scoringfunction, and computes an optimal solution with respect tothe given scoring function. We evaluate the accuracy of Fast-LAS over real-world datasets for access control policies andshow that varying the scoring function allows a user to tar-get domain-specific performance metrics. We also compareFastLAS to state-of-the-art ILP systems, using the standardILP bias for shorter solutions, and demonstrate that FastLASis significantly faster and more scalable
Mesopore etching under supercritical conditions – A shortcut to hierarchically porous silica monoliths
Hierarchically porous silica monoliths are obtained in the two-step Nakanishi process, where formation of a macro microporous silica gel is followed by widening micropores to mesopores through surface etching. The latter step is carried out through hydrothermal treatment of the gel in alkaline solution and necessitates a lengthy solvent exchange of the aqueous pore fluid before the ripened gel can be dried and calcined into a mechanically stable macro mesoporous monolith. We show that using an ethanol water (95.6/4.4, v/v) azeotrope as supercritical fluid for mesopore etching eliminates the solvent exchange, ripening, and drying steps of the classic route and delivers silica monoliths that can withstand fast heating rates for calcination. The proposed shortcut decreases the overall preparation time from ca. one week to ca. one day. Porosity data show that the alkaline conditions for mesopore etching are crucial to obtain crack-free samples with a narrow mesopore size distribution. Physical reconstruction of selected samples by confocal laser scanning microscopy and subsequent morphological analysis confirms that monoliths prepared via the proposed shortcut possess the high homogeneity of silica skeleton and macropore space that is desirable in adsorbents for flow-through applications
Polynomial Kernels and User Reductions for the Workflow Satisfiability Problem
The Workflow Satisfiability Problem (WSP) is a problem of practical interest
that arises whenever tasks need to be performed by authorized users, subject to
constraints defined by business rules. We are required to decide whether there
exists a plan -- an assignment of tasks to authorized users -- such that all
constraints are satisfied.
The WSP is, in fact, the conservative Constraint Satisfaction Problem (i.e.,
for each variable, here called task, we have a unary authorization constraint)
and is, thus, NP-complete. It was observed by Wang and Li (2010) that the
number k of tasks is often quite small and so can be used as a parameter, and
several subsequent works have studied the parameterized complexity of WSP
regarding parameter k.
We take a more detailed look at the kernelization complexity of WSP(\Gamma)
when \Gamma\ denotes a finite or infinite set of allowed constraints. Our main
result is a dichotomy for the case that all constraints in \Gamma\ are regular:
(1) We are able to reduce the number n of users to n' <= k. This entails a
kernelization to size poly(k) for finite \Gamma, and, under mild technical
conditions, to size poly(k+m) for infinite \Gamma, where m denotes the number
of constraints. (2) Already WSP(R) for some R \in \Gamma\ allows no polynomial
kernelization in k+m unless the polynomial hierarchy collapses.Comment: An extended abstract appears in the proceedings of IPEC 201
- …