HACK: A Health-based Access Control Mechanism for Dynamic Enterprise Environments
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Active In SP

Posts: 1,124
Joined: Jun 2010
27-09-2010, 11:35 AM

.pdf   HACK.pdf (Size: 791.73 KB / Downloads: 40)

This article is presented by:
Chenjia Wang
Department of Computer Science
Wayne State University

Kevin P. Monaghan
Department of Computer Science
Wayne State University

Weisong Shi
Department of Computer Science
Wayne State University


Current access control schemes focus on the user and their rights and privileges relating to the access to both initiating functionality and accessing information. This approach, while appropriate with respect to access control for the user, misses a very important aspect - the software itself. In this paper, we propose HACK, a health-based, adaptive access control scheme, that provides for both the machine and its software to act on behalf of the users during access. Paramount is that the software itself is included as part of the access control determination. The health of software can be determined when the user attempts to create a new process executing that software. HACK checks its own information about the software to determine its health and can also ask neighboring machines on the network running the same software to provide a health status. Lastly, HACK adapts the access control based on the behavior of the software in response to certain events. With the growth of heterogeneity in the mobile computing environment, secure access is becoming more challenging in design.[5] Laptop, notebook, tablet, and pocket computers, and other mobile computing devices, have been widely used in the enterprise environment but the attention paid to the challenge of securing the computing environment is far from enough. Actually, according to the Redefining Personal Computing with Virtual Computing talk given by Professor Lam in 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 78% use personal computers for work and 43% use work computers for personal use. [3] In the logical perspective, access control decides whether to grant the access right of the object to the principal and in the paper [4], Lampson et al. propose the concepts, protocols and algorithms for access control in distributed systems. The security level of the existing access control mechanisms are either lower than the expectation, which causes the existence of potential risk, or extremely higher than it should be, which has seriously limited the privileges of the user. The conventional role-based access control and rule-based access control mechanisms seem to be unqualified to meet the new requirements posed by the mobile computing environment. Even the extended access control mechanisms of them, such as temporal role-based access control (TRBAC) [1] which supports periodic role enabling and disabling and temporal dependencies among such actions, and generalized role-based access control (GRBAC) may alsohave some difficulties to face the challenge. Team-based access control (TBAC) is another access control mechanism and the extension access control mechanism of it, the C-TMAC [2] would collect the contextual information including time of access, the location from which access is requested, the location where the object to be accessed resides, transactionspecific values that dictate special access policies, and so on. However, it does not touch on the key component of the contextual information of the client machine which we believe is the health state of the machine. Under this situation, a new adaptive and secure mechanism for access control is highly demanded. In this paper, we propose HACK, a health-based, adaptive access control scheme. Our approach with HACK is unique in the following ways: we focus on the health of the machines with respect to access control, not the security credentials or privileges of the user; our approach utilizes both a local and community-based check for health, i.e. the status of software is determined not only by the machine running the software but also by its neighboring community; and lastly, our approach is adaptive, i.e. events that take place can alter the state of the machine and can dynamically alter the health of software and therefore its access control. Our key contributions are in the detection of malicious software using a hash of the file contents, the determination of software behavior by a community check, and in the adaptive behavior of the machine based on current state and healthy-based access control events. The remainder of the paper is organized as follows. The design of HACK is presented in Section 2. Section 3 describes the implementation of HACK and the performance evaluation is detailed in Section 4. Sections 5 and 6 cover discussion and related work, respectively.

For more information about this article please follow the link:


Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: zigbee device access control and reliable data transmission in zigbee based health monitoring system abstract, how to hack alvarion wimax, vodacom unlimited data hack, inventory hack minecraft, hack imsi simcard, hack semianr report, how to hack the zylog wifi,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
Thumbs Up Inventory Control System uttuswami 2 720 20-10-2014, 07:46 PM
Last Post: CxWfRyIPv
  Identifying Evolving Groups in Dynamic Multimode Networks Projects9 2 1,127 30-09-2013, 10:54 AM
Last Post: Guest
  PERSONALISED SEARCH ENGINE WITH DYNAMIC UPDATION pdf seminar projects maker 0 290 28-09-2013, 12:28 PM
Last Post: seminar projects maker
  Web based java compiler online with security access Report seminar projects maker 0 527 27-09-2013, 02:14 PM
Last Post: seminar projects maker
  Fuzzy MLS: An Experiment on Quantified Risk– Adaptive Access Control seminar projects maker 0 319 26-09-2013, 02:10 PM
Last Post: seminar projects maker
  Privacy-Conscious Location-Based Queries in Mobile Environments pdf seminar projects maker 0 393 24-09-2013, 03:35 PM
Last Post: seminar projects maker
  RATIONSHOP INVENTORY CONTROL SYSTEM full report smart paper boy 17 6,809 20-09-2013, 09:47 AM
Last Post: seminar projects maker
  access my pc full report project report tiger 2 1,123 19-09-2013, 09:26 AM
Last Post: seminar projects maker
  Kalman Filter-Based Distributed Predictive Control of Large-Scale Multi-Rate pdf study tips 0 357 09-09-2013, 03:32 PM
Last Post: study tips
  Energy Optimization Mechanism for Mobile Terminals using Vertical Handoff pdf study tips 0 296 07-09-2013, 02:10 PM
Last Post: study tips