Multi-tenant attribute-based access control for cloud infrastructure services

C Ngo, Y Demchenko, C de Laat - Journal of information security and …, 2016 - Elsevier
Cloud Computing is developed as a new wave of ICT technologies, offering a common
approach to on-demand provisioning of computation, storage and network resources that …

Capability-based delegation model in RBAC

K Hasebe, M Mabuchi, A Matsushita - … of the 15th ACM symposium on …, 2010 - dl.acm.org
For flexible and dynamic resource management in environments where users collaborate to
fulfill their common tasks, various attempts at modeling delegation of authority have been …

Model checking of security-sensitive business processes

A Armando, SE Ponta - International Workshop on Formal Aspects in …, 2009 - Springer
Security-sensitive business processes are business processes that must comply with
security requirements (eg authorization constraints). In previous works it has been shown …

Design and implementation of a secure and flexible access-right delegation for resource constrained environments

T Rabehaja, S Pal, M Hitchens - Future Generation Computer Systems, 2019 - Elsevier
With the emergence of the Internet of Things (IoT) technology, devices are becoming more
ubiquitous and openly accessible to the users. Commonly, IoT devices are constrained in …

RBAC administration in distributed systems

MAC Dekker, J Crampton, S Etalle - … of the 13th ACM symposium on …, 2008 - dl.acm.org
Large and distributed access control systems are increasingly common, for example in
health care. In such settings, access control policies may become very complex, thus …

On the security of delegation in access control systems

Q Wang, N Li, H Chen - … -ESORICS 2008: 13th European Symposium on …, 2008 - Springer
Delegation is a mechanism that allows a user A to act on another user B's behalf by making
B's access rights available to A. It is well recognized as an important mechanism to provide …

Model checking authorization requirements in business processes

A Armando, SE Ponta - Computers & Security, 2014 - Elsevier
Business processes are usually expected to meet high level authorization requirements (eg,
Separation of Duty). Since violation of authorization requirements may lead to economic …

Discrepancy-based networks for unsupervised domain adaptation: A comparative study

G Csurka, F Baradel, B Chidlovskii… - Proceedings of the …, 2017 - openaccess.thecvf.com
Abstract Domain Adaptation (DA) exploits labeled data and models from similar domains in
order to alleviate the annotation burden when learning a model in a new domain. Our …

Security analysis for temporal role based access control

E Uzun, V Atluri, J Vaidya, S Sural… - Journal of computer …, 2014 - content.iospress.com
Providing restrictive and secure access to resources is a challenging and socially important
problem. Among the many formal security models, Role Based Access Control (RBAC) has …

Managing delegation in access control models

MB Ghorbel-Talbi, F Cuppens… - 15th International …, 2007 - ieeexplore.ieee.org
In the field of access control, delegation is an impor-tant aspect that is considered as a part
of the administra-tion mechanism. Thus, a complete access control must pro-vide a flexible …