Performance evaluation of XACML PDP implementations

F Turkmen, B Crispo - Proceedings of the 2008 ACM workshop on …, 2008 - dl.acm.org
eXtensible Access Control Markup Language (XACML), an OASIS standard, is the most
widely used policy specifica-tion language for access control. Its simplicity in syntax and …

[ΒΙΒΛΙΟ][B] Peer-to-peer data management

K Aberer - 2011 - books.google.com
This lecture introduces systematically into the problem of managing large data collections in
peer-to-peer systems. Search over large datasets has always been a key problem in peer-to …

Practical access control management for distributed collaborative editors

A Cherif, A Imine, M Rusinowitch - Pervasive and Mobile Computing, 2014 - Elsevier
The project summarized in this article aims at develo** techniques to support access
control in Real-Time Distributed Collaborative Editors (RCE). The ever-increasing role of …

Decentralized Access Control Using The Blockchain

T Jamsrandorj - 2017 - harvest.usask.ca
To effectively participate in modern collaborations, member organizations should be able to
share digital resources with various partners, while ensuring their digital resources are …

An access control mechanism for P2P collaborations

C Sturm, KR Dittrich, P Ziegler - … of the 2008 international workshop on …, 2008 - dl.acm.org
We introduce a fine grained access control mechanism for Peer-to-Peer collaborations. It is
based on the local access control components of the participants. The peers export their …

Towards access control aware p2p data management systems

R Narendula, Z Miklós, K Aberer - Proceedings of the 2009 EDBT/ICDT …, 2009 - dl.acm.org
P2P data management systems provide a scalable alternative to centralized architectures.
Their adoption, however, is limited by the lack of possibility to control the access to the …

An improved distributed access control model in cloud computing by blockchain

A Sabzmakan, SL Mirtaheri - 2021 26th International Computer …, 2021 - ieeexplore.ieee.org
With the ever-expanding digital communications and the need for advanced interoperability
and collaboration, organizations and entities need to share their digital assets. Cloud …

Access control models for collaborative applications

A Cherif - 2012 - theses.hal.science
The importance of collaborative systems in real-world applications has grown significantly
over the recent years. The majority of new applications are designed in a distributed fashion …

k-rAC: A Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables

O Kieselmann, A Wacker, G Schiele - Proceedings of the 12th …, 2017 - dl.acm.org
Distributed Hash Tables (DHT) are a common architecture for decentralized data
management. However, currently existing DHTs allow every participant to access any index …

Optimistic access control for distributed collaborative editors

A Cherif, A Imine, M Rusinowitch - … of the 2011 ACM Symposium on …, 2011 - dl.acm.org
The importance of collaborative systems in real-world applications has grown significantly
over the recent years. The majority of new applications are designed in a distributed fashion …