Frequency : 12 issues per year
Subject : Computer Applications and Technology
ISSN : 2319–8656 (Online)
IJCATR Volume 3 Issue 4
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
Jeena S Watson R. Natchadalingam
10.7753/IJCATR0304.1003
keywords : Policy Algebra Framework; Ubiquitous Enforcement Mechanism; Policy Administration; Policy Matching; Algebraic Framework; Policy Composition and Delegation.
The network level access control policy is based on policy rule. The policy rule is a basic building of a policy based system. Each policy contains set of conditions and actions. Here conditions are evaluated to determine whether the actions are performed. The existing work is based on packet filtering scenario. Here every policy can be translated into canonical form. That uses the “First Matching Rule” resolution strategy. The access control matrix is proposed to translate the policy. The Generalized Aryabhata Reminder Theorem (GART) is used for to construct the access control matrix. In this access control matrix rows represent users and columns represent files. In which each user is associated with key and each digital file is associated with lock.
@artical{j342014ijcatr03041003,
Title = "AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT",
Journal ="International Journal of Computer Applications Technology and Research(IJCATR)",
Volume = "3",
Issue ="4",
Pages ="200 - 208",
Year = "2014",
Authors ="Jeena S Watson R. Natchadalingam"}
null