Current research and open problems in attribute-based access control
D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …
A survey of role mining
Role-Based Access Control (RBAC) is the most widely used model for advanced access
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …
A survey on empirical security analysis of access-control systems: a real-world perspective
There any many different access-control systems, yet a commonality is that they provide
flexible mechanisms to enforce different access levels. Their importance in organisations to …
flexible mechanisms to enforce different access levels. Their importance in organisations to …
An access control model for resource sharing based on the role-based access control intended for multi-domain manufacturing internet of things
Manufacturing Internet of Things (MIoT) represents the manufacturing oriented to Internet of
Things with two important characteristics, resource sharing and process collaboration …
Things with two important characteristics, resource sharing and process collaboration …
Satisfiability and resiliency in workflow authorization systems
Q Wang, N Li - ACM Transactions on Information and System Security …, 2010 - dl.acm.org
We propose the role-and-relation-based access control (R2BAC) model for workflow
authorization systems. In R2BAC, in addition to a user's role memberships, the user's …
authorization systems. In R2BAC, in addition to a user's role memberships, the user's …
On the practicality of cryptographically enforcing dynamic access control policies in the cloud
WC Garrison, A Shull, S Myers… - 2016 IEEE Symposium …, 2016 - ieeexplore.ieee.org
The ability to enforce robust and dynamic access controls on cloud-hosted data while
simultaneously ensuring confidentiality with respect to the cloud itself is a clear goal for …
simultaneously ensuring confidentiality with respect to the cloud itself is a clear goal for …
Mining roles with multiple objectives
With the growing adoption of Role-Based Access Control (RBAC) in commercial security
and identity management products, how to facilitate the process of migrating a non-RBAC …
and identity management products, how to facilitate the process of migrating a non-RBAC …
Policy analysis for administrative role-based access control
Role-Based Access Control (RBAC) is a widely used model for expressing access control
policies. In large organizations, the RBAC policy may be collectively managed by many …
policies. In large organizations, the RBAC policy may be collectively managed by many …
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as
an important problem in security. Enterprise access-control systems have grown to protect …
an important problem in security. Enterprise access-control systems have grown to protect …
[PDF][PDF] Automated analysis and debugging of network connectivity policies
Network connectivity policies are crucial for assuring the security and availability of large-
scale datacenter. Managing these policies is fraught with complexity and operator errors …
scale datacenter. Managing these policies is fraught with complexity and operator errors …