Multi-tenant attribute-based access control for cloud infrastructure services
Cloud Computing is developed as a new wave of ICT technologies, offering a common
approach to on-demand provisioning of computation, storage and network resources that …
approach to on-demand provisioning of computation, storage and network resources that …
Capability-based delegation model in RBAC
K Hasebe, M Mabuchi, A Matsushita - … of the 15th ACM symposium on …, 2010 - dl.acm.org
For flexible and dynamic resource management in environments where users collaborate to
fulfill their common tasks, various attempts at modeling delegation of authority have been …
fulfill their common tasks, various attempts at modeling delegation of authority have been …
Model checking of security-sensitive business processes
Security-sensitive business processes are business processes that must comply with
security requirements (eg authorization constraints). In previous works it has been shown …
security requirements (eg authorization constraints). In previous works it has been shown …
Design and implementation of a secure and flexible access-right delegation for resource constrained environments
T Rabehaja, S Pal, M Hitchens - Future Generation Computer Systems, 2019 - Elsevier
With the emergence of the Internet of Things (IoT) technology, devices are becoming more
ubiquitous and openly accessible to the users. Commonly, IoT devices are constrained in …
ubiquitous and openly accessible to the users. Commonly, IoT devices are constrained in …
RBAC administration in distributed systems
Large and distributed access control systems are increasingly common, for example in
health care. In such settings, access control policies may become very complex, thus …
health care. In such settings, access control policies may become very complex, thus …
On the security of delegation in access control systems
Q Wang, N Li, H Chen - … -ESORICS 2008: 13th European Symposium on …, 2008 - Springer
Delegation is a mechanism that allows a user A to act on another user B's behalf by making
B's access rights available to A. It is well recognized as an important mechanism to provide …
B's access rights available to A. It is well recognized as an important mechanism to provide …
Model checking authorization requirements in business processes
Business processes are usually expected to meet high level authorization requirements (eg,
Separation of Duty). Since violation of authorization requirements may lead to economic …
Separation of Duty). Since violation of authorization requirements may lead to economic …
Discrepancy-based networks for unsupervised domain adaptation: A comparative study
Abstract Domain Adaptation (DA) exploits labeled data and models from similar domains in
order to alleviate the annotation burden when learning a model in a new domain. Our …
order to alleviate the annotation burden when learning a model in a new domain. Our …
Security analysis for temporal role based access control
Providing restrictive and secure access to resources is a challenging and socially important
problem. Among the many formal security models, Role Based Access Control (RBAC) has …
problem. Among the many formal security models, Role Based Access Control (RBAC) has …
Managing delegation in access control models
In the field of access control, delegation is an impor-tant aspect that is considered as a part
of the administra-tion mechanism. Thus, a complete access control must pro-vide a flexible …
of the administra-tion mechanism. Thus, a complete access control must pro-vide a flexible …