A survey of role mining

B Mitra, S Sural, J Vaidya, V Atluri - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Role-Based Access Control (RBAC) is the most widely used model for advanced access
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …

Sok: context and risk aware access control for zero trust systems

S **ao, Y Ye, N Kanwal, T Newe… - Security and …, 2022 - Wiley Online Library
Evolving computing technologies such as cloud, edge computing, and the Internet of Things
(IoT) are creating a more complex, dispersed, and dynamic enterprise operational …

Intelligent performance-aware adaptation of control policies for optimizing banking teller process using machine learning

B Tay, A Mourad - IEEE Access, 2020 - ieeexplore.ieee.org
In the current banking systems and business processes, the permission granted to
employees is controlled and managed by the configured access control methods, in which …

Context-aware usage control for android

G Bai, L Gu, T Feng, Y Guo, X Chen - … September 7-9, 2010. Proceedings 6, 2010 - Springer
The security of smart phones is increasingly important due to their rapid popularity. Mobile
computing on smart phones introduces many new characteristics such as personalization …

地理信息安全技术研究进展与展望

朱长青, 任娜, 徐鼎捷 - Cehui Xuebao, 2022 - search.proquest.com
随着地理信息应用的深入, 精度高, 涉密广的地理信息安全保护要求与现阶段经济发展对地理
信息共享需求的矛盾日益尖锐, 如何在安全的前提下促进地理信息最大程度的共享已成为目前 …

Role based access control with spatiotemporal context for mobile applications.

S Aich, S Mondal, S Sural, AK Majumdar - Trans. Comput. Sci., 2009 - Springer
Role based access control (RBAC) is an established paradigm in resource protection.
However, with the proliferation of mobile computing, it is being frequently observed that the …

Enforcing spatial constraints for mobile RBAC systems

MS Kirkpatrick, E Bertino - Proceedings of the 15th ACM symposium on …, 2010 - dl.acm.org
Proposed models for spatially-aware extensions of role-based access control (RBAC)
combine the administrative and security advantages of RBAC with the dynamic nature of …

Specification, validation, and enforcement of a generalized spatio-temporal role-based access control model

R Abdunabi, M Al-Lail, I Ray… - IEEE Systems Journal, 2013 - ieeexplore.ieee.org
With the advent of wireless and mobile devices, many new applications are being
developed that make use of the spatio-temporal information of a user to provide better …

Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database

MP Singh, S Sural, J Vaidya, V Atluri - Computers & security, 2019 - Elsevier
Over the last few years, various types of access control models have been proposed for
expressing the growing needs of organizations. Out of these, there is an increasing interest …

Prox-RBAC: A proximity-based spatially aware RBAC

MS Kirkpatrick, ML Damiani, E Bertino - Proceedings of the 19th ACM …, 2011 - dl.acm.org
As mobile computing devices are becoming increasingly dominant in enterprise and
government organizations, the need for fine-grained access control in these environments …