Current research and open problems in attribute-based access control
D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …
A unified attribute-based access control model covering DAC, MAC and RBAC
X **, R Krishnan, R Sandhu - Data and Applications Security and Privacy …, 2012 - Springer
Recently, there has been considerable interest in attribute based access control (ABAC) to
overcome the limitations of the dominant access control models (ie, discretionary-DAC …
overcome the limitations of the dominant access control models (ie, discretionary-DAC …
Survey on delegated and self-contained authorization techniques in CPS and IoT
Authentication, authorization, and digital identity management are core features required by
secure digital systems. In this, authorization is a key component for regulating the detailed …
secure digital systems. In this, authorization is a key component for regulating the detailed …
Abac-cc: Attribute-based access control and communication control for internet of things
Internet of Things (IoT) is revolutionizing the capabilities of the Internet with billions of
connected devices in the cyberspace. These devices are commonly referred to as smart …
connected devices in the cyberspace. These devices are commonly referred to as smart …
HGABAC: Towards a formal model of hierarchical attribute-based access control
D Servos, SL Osborn - Foundations and Practice of Security: 7th …, 2015 - Springer
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie discretionary access control (DAC), mandatory access control (MAC) and …
access control (ie discretionary access control (DAC), mandatory access control (MAC) and …
Label-based access control: An ABAC model with enumerated authorization policy
P Biswas, R Sandhu, R Krishnan - Proceedings of the 2016 ACM …, 2016 - dl.acm.org
There are two major techniques for specifying authorization policies in Attribute Based
Access Control (ABAC) models. The more conventional approach is to define policies by …
Access Control (ABAC) models. The more conventional approach is to define policies by …
A data classification method for inconsistency and incompleteness detection in access control policy sets
Access control policies may contain anomalies such as incompleteness and inconsistency,
which can result in security vulnerabilities. Detecting such anomalies in large sets of …
which can result in security vulnerabilities. Detecting such anomalies in large sets of …
The Administrative Model for User and Group Attribute Assignment
Several attribute-based access control (ABAC) models have been recently proposed to
provide finer-grained authorization and to address the shortcomings of existing models. In …
provide finer-grained authorization and to address the shortcomings of existing models. In …
Mitigating Risks in the Cloud-Based Metaverse Access Control Strategies and Techniques
The advent of the metaverse has revolutionized virtual interactions and navigation,
introducing intricate access control challenges. This paper addresses the need for effective …
introducing intricate access control challenges. This paper addresses the need for effective …
Secure access control for health information sharing systems
S Alshehri, RK Raj - 2013 IEEE international conference on …, 2013 - ieeexplore.ieee.org
The Health Information Technology for Economic and Clinical Health Act (HITECH) of 2009
encourages healthcare providers to share information to improve healthcare quality at …
encourages healthcare providers to share information to improve healthcare quality at …