Skip to search formSkip to main contentSkip to account menu

Context-based access control

Known as: CBAC 
Context-based access control (CBAC) is a feature of firewall software which intelligently filters TCP and UDP packets based on application layer… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
........................................................................................................................................................ II PREFACE .......................................................................................................................................................... III SUMMARY ........................................................................................................................................................ IV ACKNOWLEDGEMENTS ......................................................................................................................................... V TABLE OF CONTENTS ......................................................................................................................................... VII LIST OF FIGURES ................................................................................................................................................. X LIST OF TABLES .................................................................................................................................................. XI CHAPTER 1: INTRODUCTION ‐ PROBLEM STATEMENT ................................................................... 1 1.1 INTRODUCTION ........................................................................................................................................ 1 1.2 PROBLEM STATEMENT .............................................................................................................................. 2 1.3 RESEARCH QUESTIONS .............................................................................................................................. 4 1.4 RESEARCH HIERARCHY AND METHODOLOGY .................................................................................................. 6 1.5 SCOPE AND CONTEXT OF THE STUDY ............................................................................................................. 7 1.6 TERMINOLOGY USED IN THE THESIS .............................................................................................................. 7 1.7 LAYOUT OF THESIS .................................................................................................................................... 8 CHAPTER 2: CASE STUDY ‐ DM BANK .................................................................................... 10 2.1 INTRODUCTION ...................................................................................................................................... 11 2.2 CASE STUDY .......................................................................................................................................... 11 2.2.1 ABC Petrol’s environment ........................................................................................................ 11 2.2.2 DM Bank’s environment .......................................................................................................... 13 2.3 ACCESS CONTROL AND THE DATA‐MINING ENVIRONMENT OF DM BANK ........................................................... 16 CHAPTER 3: EMERGING THEORIES AND PERSPECTIVES RELEVANT TO ACCESS CONTROL AND SECURITY POLICIES ......................................................................................................................... 18 3.1 INTRODUCTION ...................................................................................................................................... 19 3.2 ACCESS CONTROL TERMINOLOGY .............................................................................................................. 19 3.3 SECURITY POLICIES AND ACCESS CONTROL POLICIES ...................................................................................... 20 3.4 ACCESS CONTROL MODELS ...................................................................................................................... 21 3.4.1 Access Control Models for Confidentiality ............................................................................... 22 3.4.1.1 Bell‐La Padula Model (BLP) ........................................................................................................... 22 3.4.1.2 Lampson model; Graham‐Denning model; Harrison‐Ruzzo‐Ullman model .................................. 23 3.4.2 Access Control Models for Conflict .......................................................................................... 24 3.4.2.1 Chinese Wall Security Policy Model .............................................................................................. 24 3.4.2.2 Aggressive Chinese Wall Security Policy Model ............................................................................ 26 3.4.3 Access Control Models for a Data‐Mining Environment .......................................................... 26 3.4.3.1 Privacy‐Preserving Access Control ................................................................................................ 26 3.4.3.2 Privacy‐Aware Access Control ....................................................................................................... 27 3.4.3.3 Privacy‐Enhanced Access Control .................................................................................................. 27 3.5 ACCESS CONTROL MODEL SUMMARY ........................................................................................................ 28 3.6 CONCLUSION ......................................................................................................................................... 29 CHAPTER 4: EMERGING THEORIES AND PERSPECTIVES RELEVANT TO ACCESS CONTROL AND DATA MINING ..................................................................................................................................... 30 4.1 INTRODUCTION ...................................................................................................................................... 31 4.2 THE DATA‐MINING PROCESS .................................................................................................................... 32 4.2.1 Business‐understanding Step [Daimler‐Benz, et al.] ................................................................ 33 4.2.1.1 Determine the business objectives ............................................................................................... 33 4.2.1.2 Determine and assess the details of the business situation .......................................................... 34 4.2.1.3 Determine the data‐mining goals .................................................................................................. 34 4.2.1.4 Produce a project plan .................................................................................................................. 34 
2013
2013
Oncogene causing Cancer is mainly a tumor oriented disorder which has been found in various parts of the body, specialized into… 
2008
2008
In pervasive computing environments (PCE), context information can have a strong impact on application adaptation, not only at… 
2007
2007
The increasing diffusion of portable devices and the widespread availability of wireless networks where users live, work and… 
2007
2007
A series of experiments was conducted to study the adsorption of 4-NP onto Palm Shell based Activated Carbon (PSAC) and the… 
Highly Cited
2004
Highly Cited
2004
Wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiquitous service provisioning… 
2004
2004
Nowadays,access control models take a system-centric view of protecting resource,and they don't take the context into account… 
Highly Cited
2004
Highly Cited
2004
We propose an algorithm for the construction of a nearly optimal integer to integer approximation of the Karhunen-Loeve Transform… 
1976
1976
pp 31-53. (12) E. Meyer, “Topological Search for Classes of Compounds in Large Files-even of Markush Formulas-at Reasonable…