Work place: School of Computer Science & Engineering, VIT University, Vellore
E-mail: aanthoniraj@vit.ac.in
Website:
Research Interests: Computational Learning Theory, Data Mining
Biography
Anthoniraj Amalanathan: holds both Bachelor and Master degree in Information Technology, and he is working as an Assistant Professor in VIT University, Vellore, India. Currently he is doing research in Semantic Web. Knowledge Engineering, Text Mining, Machine Learning, Open Source Programming are main interested areas to him. He is the developer and contributor of Open Source Community. He has also developed websites for some nonprofit organizations. He has delivered lot of Open Source Related talks and conducted Linux workshops.
By N. Senthil Kumar Anthoniraj Amalanathan
DOI: https://doi.org/10.5815/ijitcs.2015.12.10, Pub. Date: 8 Nov. 2015
Many enterprises have intended to promote their applications with stern access control mechanism and yield the stringent authorization deployment in their individual proprietary manner. The development of this build up will result in tight coupling of authorization mechanisms within the enterprise applications. In many enterprises setup, the implicit authorization processes are embedded within the application and promote error prone accessing of requested policies. This sort of embedded authorization will let the users to carry out the specific actions without knowing the access control policy as well as its embedded setup with the help of third party involvement. But this approach has some serious effects in controlling the issues such as skipping the trust based applications, violates the policy setups and pave the way to exploit the authorized data to the end users. Many enterprises had faced serious problem in controlling its sensitive data from this implicit authorization decisions and hence decided to develop a security mechanism which can be totally controlled by centralized way of access policy. Therefore, the eXtensible Access Control Markup Language (XACML) provides a very simple and powerful remedy for authorization mechanism and for the access policy set ups.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals