Context-aware role-based access control in pervasive computing systems
D Kulkarni, A Tripathi - Proceedings of the 13th ACM symposium on …, 2008 - dl.acm.org
In this paper we present a context-aware RBAC (CARBAC) model for pervasive computing
applications. The design of this model has been guided by the context-based access control …
applications. The design of this model has been guided by the context-based access control …
Separation of Duty in Information Security
Separation of Duty (SoD) is a fundamental security principle that ensures that critical tasks or
functions are divided upon multiple users in order to prevent fraud. The topic of SoD spans …
functions are divided upon multiple users in order to prevent fraud. The topic of SoD spans …
Security analysis in role-based access control
The administration of large role-based access control (RBAC) systems is a challenging
problem. In order to administer such systems, decentralization of administration tasks by the …
problem. In order to administer such systems, decentralization of administration tasks by the …
On mutually exclusive roles and separation-of-duty
Separation-of-duty (SoD) is widely considered to be a fundamental principle in computer
security. A static SoD (SSoD) policy states that in order to have all permissions necessary to …
security. A static SoD (SSoD) policy states that in order to have all permissions necessary to …
Satisfiability and resiliency in workflow authorization systems
Q Wang, N Li - ACM Transactions on Information and System Security …, 2010 - dl.acm.org
We propose the role-and-relation-based access control (R2BAC) model for workflow
authorization systems. In R2BAC, in addition to a user's role memberships, the user's …
authorization systems. In R2BAC, in addition to a user's role memberships, the user's …
The consistency of task-based authorization constraints in workflow
Workflow management systems (WFMSs) have attracted a lot of interest both in academia
and the business community. A workflow consists of a collection of tasks that are organized …
and the business community. A workflow consists of a collection of tasks that are organized …
The Policy Machine: A novel architecture and framework for access control policy specification and enforcement
The ability to control access to sensitive data in accordance with policy is perhaps the most
fundamental security requirement. Despite over four decades of security research, the …
fundamental security requirement. Despite over four decades of security research, the …
CP‐ABE access control scheme for sensitive data set constraint with hidden access policy and constraint policy
N Helil, K Rahman - Security and Communication Networks, 2017 - Wiley Online Library
CP‐ABE (Ciphertext‐Policy Attribute‐Based Encryption) with hidden access control policy
enables data owners to share their encrypted data using cloud storage with authorized …
enables data owners to share their encrypted data using cloud storage with authorized …
Supporting rbac with xacml+ owl
R Ferrini, E Bertino - Proceedings of the 14th ACM symposium on …, 2009 - dl.acm.org
XACML does not natively support RBAC and even the pecialized XACML profiles are not
able to support many relevant constraints such as static and dynamic separation of duty …
able to support many relevant constraints such as static and dynamic separation of duty …
Representing and reasoning about web access control policies
The advent of emerging technologies such as Web services, service-oriented architecture,
and cloud computing has enabled us to perform business services more efficiently and …
and cloud computing has enabled us to perform business services more efficiently and …