Current research and open problems in attribute-based access control

D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …

A survey on access control mechanisms for cloud computing

R El Sibai, N Gemayel, J Bou Abdo… - Transactions on …, 2020 - Wiley Online Library
Cloud computing is an Internet‐based computing where the information technology
resources are provided to end users following their request. With this technology, users and …

All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)

EJ Schwartz, T Avgerinos… - 2010 IEEE symposium on …, 2010 - ieeexplore.ieee.org
Dynamic taint analysis and forward symbolic execution are quickly becoming staple
techniques in security analyses. Example applications of dynamic taint analysis and forward …

On the impossibility of obfuscation with auxiliary input

S Goldwasser, YT Kalai - 46th Annual IEEE Symposium on …, 2005 - ieeexplore.ieee.org
Barak et al. formalized the notion of obfuscation, and showed that there exist (contrived)
classes of functions that cannot be obfuscated. In contrast, Canetti and Wee showed how to …

Delegation in role-based access control

J Crampton, H Khambhammettu - International Journal of Information …, 2008 - Springer
User delegation is a mechanism for assigning access rights available to one user to another
user. A delegation can either be a grant or transfer operation. Existing work on delegation in …

Multi‐tenancy authorization models for collaborative cloud services

B Tang, R Sandhu, Q Li - Concurrency and Computation …, 2015 - Wiley Online Library
The cloud service model intrinsically caters to multiple tenants, most obviously not only in
public clouds but also in private clouds for large organizations. Currently, most cloud service …

DW-RBAC: A formal security model of delegation and revocation in workflow systems

J Wainer, A Kumar, P Barthelmess - Information Systems, 2007 - Elsevier
One reason workflow systems have been criticized as being inflexible is that they lack
support for delegation. This paper shows how delegation can be introduced in a workflow …

A fine-grained, controllable, user-to-user delegation method in RBAC

J Wainer, A Kumar - Proceedings of the tenth ACM symposium on …, 2005 - dl.acm.org
This paper addresses the issues surrounding user-to-user delegation in RBAC. We show
how delegations can be incorporated into the RBAC model in a simple and straightforward …

A multi-tenant RBAC model for collaborative cloud services

B Tang, Q Li, R Sandhu - 2013 eleventh annual conference on …, 2013 - ieeexplore.ieee.org
Most cloud services are built with multi-tenancy which enables data and configuration
segregation upon shared infrastructures. In this setting, a tenant temporarily uses a piece of …

Disjoint eager execution: An optimal form of speculative execution

AK Uht, V Sindagi, K Hall - Proceedings of the 28th annual …, 1995 - ieeexplore.ieee.org
Instruction Level Parallelism (ILP) speedups of an order-of-magnitude or greater may be
possible using the techniques described herein. Traditional speculative code execution is …