Database security-concepts, approaches, and challenges

E Bertino, R Sandhu - IEEE Transactions on Dependable and …, 2005 - ieeexplore.ieee.org
As organizations increase their reliance on, possibly distributed, information systems for
daily business, they become more vulnerable to security breaches even as they gain …

Access control in collaborative systems

W Tolone, GJ Ahn, T Pai, SP Hong - ACM Computing Surveys (CSUR), 2005 - dl.acm.org
Balancing the competing goals of collaboration and security is a difficult, multidimensional
problem. Collaborative systems often focus on building useful connections among people …

Data security and privacy-preserving in edge computing paradigm: Survey and open issues

J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …

Proposed NIST standard for role-based access control

DF Ferraiolo, R Sandhu, S Gavrila, DR Kuhn… - ACM Transactions on …, 2001 - dl.acm.org
In this article we propose a standard for role-based access control (RBAC). Although RBAC
models have received broad support as a generalized approach to access control, and are …

A generalized temporal role-based access control model

JBD Joshi, E Bertino, U Latif… - IEEE transactions on …, 2005 - ieeexplore.ieee.org
Role-based access control (RBAC) models have generated a great interest in the security
community as a powerful and generalized approach to security management. In many …

Model driven security: From UML models to access control infrastructures

D Basin, J Doser, T Lodderstedt - ACM Transactions on Software …, 2006 - dl.acm.org
We present a new approach to building secure systems. In our approach, which we call
Model Driven Security, designers specify system models along with their security …

Extending query rewriting techniques for fine-grained access control

S Rizvi, A Mendelzon, S Sudarshan, P Roy - Proceedings of the 2004 …, 2004 - dl.acm.org
Current day database applications, with large numbers of users, require fine-grained access
control mechanisms, at the level of individual tuples, not just entire relations/views, to control …

A rule-based framework for role-based delegation and revocation

L Zhang, GJ Ahn, BT Chu - … on Information and System Security (TISSEC …, 2003 - dl.acm.org
Delegation is the process whereby an active entity in a distributed environment authorizes
another entity to access resources. In today's distributed systems, a user often needs to act …

Context-aware role-based access control in pervasive computing systems

D Kulkarni, A Tripathi - Proceedings of the 13th ACM symposium on …, 2008 - dl.acm.org
In this paper we present a context-aware RBAC (CARBAC) model for pervasive computing
applications. The design of this model has been guided by the context-based access control …

A model of OASIS role-based access control and its support for active security

J Bacon, K Moody, W Yao - … on Information and System Security (TISSEC …, 2002 - dl.acm.org
OASIS is a role-based access control architecture for achieving secure interoperation of
services in an open, distributed environment. The aim of OASIS is to allow autonomous …