Database security-concepts, approaches, and challenges
As organizations increase their reliance on, possibly distributed, information systems for
daily business, they become more vulnerable to security breaches even as they gain …
daily business, they become more vulnerable to security breaches even as they gain …
Access control in collaborative systems
W Tolone, GJ Ahn, T Pai, SP Hong - ACM Computing Surveys (CSUR), 2005 - dl.acm.org
Balancing the competing goals of collaboration and security is a difficult, multidimensional
problem. Collaborative systems often focus on building useful connections among people …
problem. Collaborative systems often focus on building useful connections among people …
Data security and privacy-preserving in edge computing paradigm: Survey and open issues
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …
edge of the network, the traditional centralized cloud computing model has come to a …
Proposed NIST standard for role-based access control
In this article we propose a standard for role-based access control (RBAC). Although RBAC
models have received broad support as a generalized approach to access control, and are …
models have received broad support as a generalized approach to access control, and are …
A generalized temporal role-based access control model
Role-based access control (RBAC) models have generated a great interest in the security
community as a powerful and generalized approach to security management. In many …
community as a powerful and generalized approach to security management. In many …
Model driven security: From UML models to access control infrastructures
D Basin, J Doser, T Lodderstedt - ACM Transactions on Software …, 2006 - dl.acm.org
We present a new approach to building secure systems. In our approach, which we call
Model Driven Security, designers specify system models along with their security …
Model Driven Security, designers specify system models along with their security …
Extending query rewriting techniques for fine-grained access control
Current day database applications, with large numbers of users, require fine-grained access
control mechanisms, at the level of individual tuples, not just entire relations/views, to control …
control mechanisms, at the level of individual tuples, not just entire relations/views, to control …
A rule-based framework for role-based delegation and revocation
L Zhang, GJ Ahn, BT Chu - … on Information and System Security (TISSEC …, 2003 - dl.acm.org
Delegation is the process whereby an active entity in a distributed environment authorizes
another entity to access resources. In today's distributed systems, a user often needs to act …
another entity to access resources. In today's distributed systems, a user often needs to act …
Context-aware role-based access control in pervasive computing systems
D Kulkarni, A Tripathi - Proceedings of the 13th ACM symposium on …, 2008 - dl.acm.org
In this paper we present a context-aware RBAC (CARBAC) model for pervasive computing
applications. The design of this model has been guided by the context-based access control …
applications. The design of this model has been guided by the context-based access control …
A model of OASIS role-based access control and its support for active security
J Bacon, K Moody, W Yao - … on Information and System Security (TISSEC …, 2002 - dl.acm.org
OASIS is a role-based access control architecture for achieving secure interoperation of
services in an open, distributed environment. The aim of OASIS is to allow autonomous …
services in an open, distributed environment. The aim of OASIS is to allow autonomous …