Current research and open problems in attribute-based access control

D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …

A survey of role mining

B Mitra, S Sural, J Vaidya, V Atluri - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Role-Based Access Control (RBAC) is the most widely used model for advanced access
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …

A survey on empirical security analysis of access-control systems: a real-world perspective

S Parkinson, S Khan - ACM Computing Surveys, 2022 - dl.acm.org
There any many different access-control systems, yet a commonality is that they provide
flexible mechanisms to enforce different access levels. Their importance in organisations to …

An access control model for resource sharing based on the role-based access control intended for multi-domain manufacturing internet of things

Q Liu, H Zhang, J Wan, X Chen - IEEE access, 2017 - ieeexplore.ieee.org
Manufacturing Internet of Things (MIoT) represents the manufacturing oriented to Internet of
Things with two important characteristics, resource sharing and process collaboration …

Satisfiability and resiliency in workflow authorization systems

Q Wang, N Li - ACM Transactions on Information and System Security …, 2010 - dl.acm.org
We propose the role-and-relation-based access control (R2BAC) model for workflow
authorization systems. In R2BAC, in addition to a user's role memberships, the user's …

On the practicality of cryptographically enforcing dynamic access control policies in the cloud

WC Garrison, A Shull, S Myers… - 2016 IEEE Symposium …, 2016 - ieeexplore.ieee.org
The ability to enforce robust and dynamic access controls on cloud-hosted data while
simultaneously ensuring confidentiality with respect to the cloud itself is a clear goal for …

Mining roles with multiple objectives

I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino… - ACM Transactions on …, 2010 - dl.acm.org
With the growing adoption of Role-Based Access Control (RBAC) in commercial security
and identity management products, how to facilitate the process of migrating a non-RBAC …

Policy analysis for administrative role-based access control

A Sasturkar, P Yang, SD Stoller… - Theoretical Computer …, 2011 - Elsevier
Role-Based Access Control (RBAC) is a widely used model for expressing access control
policies. In large organizations, the RBAC policy may be collectively managed by many …

Automatic error finding in access-control policies

K Jayaraman, V Ganesh, M Tripunitara… - Proceedings of the 18th …, 2011 - dl.acm.org
Verifying that access-control systems maintain desired security properties is recognized as
an important problem in security. Enterprise access-control systems have grown to protect …

[PDF][PDF] Automated analysis and debugging of network connectivity policies

K Jayaraman, N Bjørner, G Outhred, C Kaufman - Microsoft Research, 2014 - microsoft.com
Network connectivity policies are crucial for assuring the security and availability of large-
scale datacenter. Managing these policies is fraught with complexity and operator errors …