Nurmamat Helil

  • Citations Per Year
Learn More
Constraints are considered to be the principal motivation for RBAC model. XACML profile for RBAC can not meet the need of expressing static and dynamic RBAC constraints well. We give the XACML syntax of common static and dynamic Separation of Duty constraints and cardinality constraints of RBAC. We also complement Role Enablement Authority to extend this(More)
Access control in dynamic environments needs the ability to provide more access opportunities of information to users, while also ensuring protection information from malicious users. Trust and risk are essential factors and can be combined together in access control decision-making to meet the above requirement. In this paper, we propose the combination of(More)
Access control constraint aims to avoid risky or sensitive set of objects being possessed by similar subjects. In order to improve the flexibility of constraints, this paper first examines potential inner-relationships among subjects, objects, and also the relationships between them in access control respectively, then proposes revised attribute-based(More)
Constraint is the core problem of high-level access control. Traditional access control constraints, such as Separation of Duty (SOD) constraints of Role-Based Access Control (RBAC) and Chinese wall policy, lack the consideration of user similarity and sensitive combination of permissions or objects. Secret sharing scheme is used to share important data or(More)
In this paper, we present a fourth-order finite difference method for solving nonlinear one-dimensional Burgers equation. This method is unconditionally stable, fourth-order accurate in space and second-order accurate in time. Accuracy of the scheme is demonstrated by solving a test problem, and the numerical results obtained by this method for different(More)
  • 1