Open Access   Article Go Back

Context-Aware Quantity Established Entrance Device Developing Operator Connection

C. Thangamalar1 , P. Sathiyapriya2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-11 , Page no. 113-118, Nov-2015

Online published on Nov 30, 2015

Copyright © C. Thangamalar, P. Sathiyapriya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: C. Thangamalar, P. Sathiyapriya, “Context-Aware Quantity Established Entrance Device Developing Operator Connection,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.11, pp.113-118, 2015.

MLA Style Citation: C. Thangamalar, P. Sathiyapriya "Context-Aware Quantity Established Entrance Device Developing Operator Connection." International Journal of Computer Sciences and Engineering 3.11 (2015): 113-118.

APA Style Citation: C. Thangamalar, P. Sathiyapriya, (2015). Context-Aware Quantity Established Entrance Device Developing Operator Connection. International Journal of Computer Sciences and Engineering, 3(11), 113-118.

BibTex Style Citation:
@article{Thangamalar_2015,
author = {C. Thangamalar, P. Sathiyapriya},
title = {Context-Aware Quantity Established Entrance Device Developing Operator Connection},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2015},
volume = {3},
Issue = {11},
month = {11},
year = {2015},
issn = {2347-2693},
pages = {113-118},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=747},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=747
TI - Context-Aware Quantity Established Entrance Device Developing Operator Connection
T2 - International Journal of Computer Sciences and Engineering
AU - C. Thangamalar, P. Sathiyapriya
PY - 2015
DA - 2015/11/30
PB - IJCSE, Indore, INDIA
SP - 113-118
IS - 11
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2254 2186 downloads 2277 downloads
  
  
           

Abstract

Part based access control is widely utilized in modern venture structures because it is adequate on the other hand reflecting the functional progressive system in different organizations’ on the other hand access control model. However, ecological changes, such as the expanding use of versatile devices, make a few challenges. Our relook suggests a relationship-based access control model that considers the connection with encompassing customers in organization. Connection is huge connection data in any case it is not considered in existing access control models. The proposed system is specific from that in conventional relook in two ways. First, we regard the relationship among employees as pertinent information. As a result, the administration the other hand can oversee fine-grained access control on the other hand helpful work in an organization. Second, we plan access control construction modeling utilizing NFC system to bargain with capacity also, security problems. Moreover, we propose a convention on the other hand enforcing the recommended access control model in genuine world. We report execution examination also, security evaluation

Key-Words / Index Term

Access Control, Context-Aware, Relationship-Based, Security

References

[1] Bai Qing-hai ; Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun, China ; Zheng Ying, “Study on the access control model”, Published in: Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC), 2011 (Volume:1 ) Date of Conference: 26-30 July 2011 Page(s): 830 – 834.
[2] Rashid, Z. ; Sch. of Electr. Eng. & Comput. Sci. (SEECS), Nat. Univ. of Sci. & Technol., Islamabad, Pakistan ; Basit, A. ; Anwar, Z., “TRDBAC: Temporal reflective database access control”, Published in: Emerging Technologies (ICET), 2010 6th International Conference on Date of Conference: 18-19 Oct. 2010 Page(s): 337 – 342.
[3] Yanfang Fan ; Sch. of Comput. & Inf. Technol., Beijing Jiaotong Univ., Beijing, China ; Zhen Han ; Jiqiang Liu ; Yong Zhao, “A Mandatory Access Control Model with Enhanced Flexibility”, Published in: Multimedia Information Networking and Security, 2009. MINES '09. International Conference on (Volume:1 ) Date of Conference: 18-20 Nov. 2009 Page(s):120 – 124.
[4] Cai Tao ; Comput. Dept., JiangSu Univ., Zhenjiang, China ; Ju Shiguang ; Niu DeJiao, “Two-Layered Access Control for Storage Area Network”, Published in: Grid and Cooperative Computing, 2009. GCC '09. Eighth International Conference on Date of Conference: 27-29 Aug. 2009 Page(s): 331 – 336.
[5] Lowe, R. ; CC Inf. Syst. & Manage., Munich Univ. of Appl. Sci., Munich, Germany ; Mandl, P. ; Weber, M., “Context Directory: A context-aware service for mobile context-aware computing applications by the example of Google Android”, Published in: Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on Date of Conference: 19-23 March 2012 Page(s): 76 – 81.
[6] Hengshu Zhu ; Univ. of Sci. & Technol. of China, Hefei, China ; Enhong Chen ; Kuifei Yu ; Huanhuan Cao, “Mining Personal Context-Aware Preferences for Mobile Users”, Published in: Data Mining (ICDM), 2012 IEEE 12th International Conference on Date of Conference: 10-13 Dec. 2012 Page(s): 1212 – 1217.
[7] Jiafu Wan ; Sch. of Mech. & Automotive Eng., South China Univ. of Technol. (SCUT), Guangzhou, China ; Daqiang Zhang ; Shengjie Zhao ; Yang, L., “Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutions, Published in: Communications Magazine, IEEE (Volume:52 , Issue: 8 ) Page(s): 106 – 113.
[8] Sheikh, K. ; Center for Telematics & Inf. Technol., Twente Univ., Enschede ; Wegdam, M. ; van Sinderen, M., “Middleware Support for Quality of Context in Pervasive Context-Aware Systems”, Published in: Pervasive Computing and Communications Workshops, 2007. PerCom Workshops '07. Fifth Annual IEEE International Conference on Date of Conference: 19-23 March 2007 Page(s): 461 – 466.
[9] Po-Cheng Huang ; Comput. Sci. & Inf. Eng., Nat. Cheng Kung Univ., Tainan ; Yau-Hwang Kuo, “A reliable Context Model for context-aware applications”, Published in: Systems, Man and Cybernetics, 2008. SMC 2008. IEEE International Conference on Date of Conference: 12-15 Oct. 2008 Page(s): 246 – 250.
[10] Wangcheng Long ; State Power Econ. Res. Inst., Beijing, China ; Feng Han ; Hui Li ; Jinyu Xiao, “The force-dynamic relation study between security and efficiency of power grid based on the evaluation model”, Published in: Power System Technology (POWERCON), 2014 International Conference on Date of Conference: 20-22 Oct. 2014 Page(s): 251 – 256.
[11] Xi-quan Guo ; Sch. of Mangagement, Jinan Univ., Guangzhou, China ; Wei-qi Luo ; Guo-xiang Yao, “Comprehensive Evaluation Based on Gray Relation Analysis for Information Security Management Measurement, Published in: Information Science and Management Engineering (ISME), 2010 International Conference of (Volume:1 ) Date of Conference: 7-8 Aug. 2010 Page(s): 143 – 146.
[12] Yau, S.S. ; Dept. of Comput. Sci. & Eng., Arizona State Univ., Tempe, AZ, USA ; Xinyu Zhang, “Computer network intrusion detection, assessment and prevention based on security dependency relation”, Published in: Computer Software and Applications Conference, 1999. COMPSAC '99. Proceedings. The Twenty-Third Annual International Date of Conference: 1999 Page(s): 86 – 91.