Work place: School of Information Technology & Engineering, VIT University, Vellore
E-mail: senthilkumar.n@vit.ac.in
Website:
Research Interests: Information Systems, Data Mining, Information Retrieval, World Wide Web
Biography
N. SenthilKumar: received his Master degree in Information Technology from VIT University, Vellore, India and M.Phil from Periyar University, Salem, India. .He has been working in VIT University as Assistant Professor since 2008. He has pocketed ten years of teaching experience since 2005. His research areas include Semantic Web, Web Mining, Information Retrieval, Query Expansion and Web services. He is currently holding a project on effective query expansion of semantic web and building a project over it.
By N. Senthil Kumar Anthoniraj Amalanathan
DOI: https://doi.org/10.5815/ijitcs.2015.12.10, Pub. Date: 8 Nov. 2015
Many enterprises have intended to promote their applications with stern access control mechanism and yield the stringent authorization deployment in their individual proprietary manner. The development of this build up will result in tight coupling of authorization mechanisms within the enterprise applications. In many enterprises setup, the implicit authorization processes are embedded within the application and promote error prone accessing of requested policies. This sort of embedded authorization will let the users to carry out the specific actions without knowing the access control policy as well as its embedded setup with the help of third party involvement. But this approach has some serious effects in controlling the issues such as skipping the trust based applications, violates the policy setups and pave the way to exploit the authorized data to the end users. Many enterprises had faced serious problem in controlling its sensitive data from this implicit authorization decisions and hence decided to develop a security mechanism which can be totally controlled by centralized way of access policy. Therefore, the eXtensible Access Control Markup Language (XACML) provides a very simple and powerful remedy for authorization mechanism and for the access policy set ups.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals