Current research and open problems in attribute-based access control

D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017‏ - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …

A blockchain based approach for the definition of auditable access control systems

DDF Maesa, P Mori, L Ricci - Computers & Security, 2019‏ - Elsevier
This work proposes to exploit blockchain technology to define Access Control systems that
guarantee the auditability of access control policies evaluation. The key idea of our proposal …

[PDF][PDF] Identity authentication and capability based access control (iacac) for the internet of things

PN Mahalle, B Anggorojati, NR Prasad… - Journal of Cyber Security …, 2013‏ - vbn.aau.dk
In the last few years the Internet of Things (IoT) has seen widespread application and can be
found in each field. Authentication and access control are important and critical …

A federated architecture approach for Internet of Things security

M Leo, F Battisti, M Carli, A Neri - 2014 Euro Med Telco …, 2014‏ - ieeexplore.ieee.org
Internet of Things (IoT) refers to the capability to connect, communicate and remotely
manage a large number of networked, automated devices via the Internet. IoT is becoming …

A rule-based framework for role-based delegation and revocation

L Zhang, GJ Ahn, BT Chu - … on Information and System Security (TISSEC …, 2003‏ - dl.acm.org
Delegation is the process whereby an active entity in a distributed environment authorizes
another entity to access resources. In today's distributed systems, a user often needs to act …

A model of OASIS role-based access control and its support for active security

J Bacon, K Moody, W Yao - … on Information and System Security (TISSEC …, 2002‏ - dl.acm.org
OASIS is a role-based access control architecture for achieving secure interoperation of
services in an open, distributed environment. The aim of OASIS is to allow autonomous …

PBDM: a flexible delegation model in RBAC

X Zhang, S Oh, R Sandhu - Proceedings of the eighth ACM symposium …, 2003‏ - dl.acm.org
Role-based access control (RBAC) is recognized as an efficient access control model for
large organizations. Most organizations have some business rules related to access control …

On the impossibility of obfuscation with auxiliary input

S Goldwasser, YT Kalai - 46th Annual IEEE Symposium on …, 2005‏ - ieeexplore.ieee.org
Barak et al. formalized the notion of obfuscation, and showed that there exist (contrived)
classes of functions that cannot be obfuscated. In contrast, Canetti and Wee showed how to …

Programming pervasive and mobile computing applications with the TOTA middleware

M Mamei, F Zambonelli - Second IEEE Annual Conference on …, 2004‏ - ieeexplore.ieee.org
Pervasive computing calls for suitable middleware and programming models to deal with
large software systems dived in dynamic mobile network environments. Here we present the …

Delegation in role-based access control

J Crampton, H Khambhammettu - International Journal of Information …, 2008‏ - Springer
User delegation is a mechanism for assigning access rights available to one user to another
user. A delegation can either be a grant or transfer operation. Existing work on delegation in …