Dòng Nội dung
1
A Configurable Framework for RBAC, MAC, and DAC for Mobile Applications / Yaira Karine Rivera Sánchez; Steven A. Demurjian; Jinbo Bi; Bing Wang; Thomas Agresta
2017
242 pages
Ký hiệu phân loại (DDC): 005.8
In the last decade, mobile computing as evidenced by the emergence of mobile devices (smartphones, phablets, tablets) has dominated personal and business computing. Users of traditional computing devices (e.g., PCs, laptops, etc.) are transitioning to mobile devices to perform daily tasks such as managing emails, playing games, viewing/editing documents, paying bills, managing healthcare data, etc. The majority of these tasks can be performed through the means of mobile applications, which is a piece of software specifically made to run on a mobile device. Mobile applications (apps) can contain data that ranges from being non-sensitive to highly-sensitive. Specifically, for those apps that contain highly-sensitive data (e.g., banking apps, electronic health records (EHRs), etc.), there is a need to provide authentication and authorization mechanisms in order to secure the application’s data. Many mobile apps provide basic user authentication, and, after successful authentication, the user has access to all of its features. Nevertheless, even though there are critical requirements for mobile apps to secure highly-sensitive data, developers have failed to establish sophisticated and multi-faceted authorization mechanisms within the mobile computing design and development process. Specifically, an argument can be made that mobile computing would significantly benefit through the adoption of the three classic access control models: Role-Based Access Control (RBAC), Mandatory Access Control (MAC), and Discretionary Access Control (DAC).
Số bản sách: (0) Tài liệu số: (1)
2
Handbook of security and networks / Yang Xiao, Frank Haizhon Li, Hui Chen
NJ, Hackensack : World Scientific, 2011
xxi, 551 pages. : illustrations ; 26 cm.
Ký hiệu phân loại (DDC): 005.8
This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioners are from highly-respected universities, renowned research institutions and IT companies from all over the world. Each self-contained chapter covers one essential research topic on security in computer networks. Through the efforts of all the authors, all chapters are written in a uniformed style; each containing a comprehensive overview, the latest pioneering work and future research direction of a research topic.
Số bản sách: (1) Tài liệu số: (0)