Context-aware role-based access control in pervasive computing systems

D Kulkarni, A Tripathi - Proceedings of the 13th ACM symposium on …, 2008 - dl.acm.org
In this paper we present a context-aware RBAC (CARBAC) model for pervasive computing
applications. The design of this model has been guided by the context-based access control …

Separation of Duty in Information Security

S Groll, L Fuchs, G Pernul - ACM Computing Surveys, 2025 - dl.acm.org
Separation of Duty (SoD) is a fundamental security principle that ensures that critical tasks or
functions are divided upon multiple users in order to prevent fraud. The topic of SoD spans …

Security analysis in role-based access control

N Li, MV Tripunitara - ACM Transactions on Information and System …, 2006 - dl.acm.org
The administration of large role-based access control (RBAC) systems is a challenging
problem. In order to administer such systems, decentralization of administration tasks by the …

On mutually exclusive roles and separation-of-duty

N Li, MV Tripunitara, Z Bizri - ACM Transactions on Information and …, 2007 - dl.acm.org
Separation-of-duty (SoD) is widely considered to be a fundamental principle in computer
security. A static SoD (SSoD) policy states that in order to have all permissions necessary to …

Satisfiability and resiliency in workflow authorization systems

Q Wang, N Li - ACM Transactions on Information and System Security …, 2010 - dl.acm.org
We propose the role-and-relation-based access control (R2BAC) model for workflow
authorization systems. In R2BAC, in addition to a user's role memberships, the user's …

The consistency of task-based authorization constraints in workflow

K Tan, J Crampton, CA Gunter - Proceedings. 17th IEEE …, 2004 - ieeexplore.ieee.org
Workflow management systems (WFMSs) have attracted a lot of interest both in academia
and the business community. A workflow consists of a collection of tasks that are organized …

The Policy Machine: A novel architecture and framework for access control policy specification and enforcement

D Ferraiolo, V Atluri, S Gavrila - Journal of Systems Architecture, 2011 - Elsevier
The ability to control access to sensitive data in accordance with policy is perhaps the most
fundamental security requirement. Despite over four decades of security research, the …

CP‐ABE access control scheme for sensitive data set constraint with hidden access policy and constraint policy

N Helil, K Rahman - Security and Communication Networks, 2017 - Wiley Online Library
CP‐ABE (Ciphertext‐Policy Attribute‐Based Encryption) with hidden access control policy
enables data owners to share their encrypted data using cloud storage with authorized …

Supporting rbac with xacml+ owl

R Ferrini, E Bertino - Proceedings of the 14th ACM symposium on …, 2009 - dl.acm.org
XACML does not natively support RBAC and even the pecialized XACML profiles are not
able to support many relevant constraints such as static and dynamic separation of duty …

Representing and reasoning about web access control policies

GJ Ahn, H Hu, J Lee, Y Meng - 2010 IEEE 34th Annual …, 2010 - ieeexplore.ieee.org
The advent of emerging technologies such as Web services, service-oriented architecture,
and cloud computing has enabled us to perform business services more efficiently and …