Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Current research and open problems in attribute-based access control
D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …
A blockchain based approach for the definition of auditable access control systems
This work proposes to exploit blockchain technology to define Access Control systems that
guarantee the auditability of access control policies evaluation. The key idea of our proposal …
guarantee the auditability of access control policies evaluation. The key idea of our proposal …
[PDF][PDF] Identity authentication and capability based access control (iacac) for the internet of things
PN Mahalle, B Anggorojati, NR Prasad… - Journal of Cyber Security …, 2013 - vbn.aau.dk
In the last few years the Internet of Things (IoT) has seen widespread application and can be
found in each field. Authentication and access control are important and critical …
found in each field. Authentication and access control are important and critical …
A federated architecture approach for Internet of Things security
M Leo, F Battisti, M Carli, A Neri - 2014 Euro Med Telco …, 2014 - ieeexplore.ieee.org
Internet of Things (IoT) refers to the capability to connect, communicate and remotely
manage a large number of networked, automated devices via the Internet. IoT is becoming …
manage a large number of networked, automated devices via the Internet. IoT is becoming …
A rule-based framework for role-based delegation and revocation
L Zhang, GJ Ahn, BT Chu - … on Information and System Security (TISSEC …, 2003 - dl.acm.org
Delegation is the process whereby an active entity in a distributed environment authorizes
another entity to access resources. In today's distributed systems, a user often needs to act …
another entity to access resources. In today's distributed systems, a user often needs to act …
A model of OASIS role-based access control and its support for active security
J Bacon, K Moody, W Yao - … on Information and System Security (TISSEC …, 2002 - dl.acm.org
OASIS is a role-based access control architecture for achieving secure interoperation of
services in an open, distributed environment. The aim of OASIS is to allow autonomous …
services in an open, distributed environment. The aim of OASIS is to allow autonomous …
PBDM: a flexible delegation model in RBAC
Role-based access control (RBAC) is recognized as an efficient access control model for
large organizations. Most organizations have some business rules related to access control …
large organizations. Most organizations have some business rules related to access control …
On the impossibility of obfuscation with auxiliary input
S Goldwasser, YT Kalai - 46th Annual IEEE Symposium on …, 2005 - ieeexplore.ieee.org
Barak et al. formalized the notion of obfuscation, and showed that there exist (contrived)
classes of functions that cannot be obfuscated. In contrast, Canetti and Wee showed how to …
classes of functions that cannot be obfuscated. In contrast, Canetti and Wee showed how to …
Programming pervasive and mobile computing applications with the TOTA middleware
M Mamei, F Zambonelli - Second IEEE Annual Conference on …, 2004 - ieeexplore.ieee.org
Pervasive computing calls for suitable middleware and programming models to deal with
large software systems dived in dynamic mobile network environments. Here we present the …
large software systems dived in dynamic mobile network environments. Here we present the …
Delegation in role-based access control
J Crampton, H Khambhammettu - International Journal of Information …, 2008 - Springer
User delegation is a mechanism for assigning access rights available to one user to another
user. A delegation can either be a grant or transfer operation. Existing work on delegation in …
user. A delegation can either be a grant or transfer operation. Existing work on delegation in …