A survey of role mining

B Mitra, S Sural, J Vaidya, V Atluri - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Role-Based Access Control (RBAC) is the most widely used model for advanced access
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …

On the interplay between cyber and physical spaces for adaptive security

C Tsigkanos, L Pasquale, C Ghezzi… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Ubiquitous computing is resulting in a proliferation of cyber-physical systems that host or
manage valuable physical and digital assets. These assets can be harmed by malicious …

The EGRBAC model for smart home IoT

S Ameer, J Benson, R Sandhu - 2020 IEEE 21st International …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is enabling smart houses, where multiple users with complex
social relationships interact with smart devices. This requires sophisticated access control …

A topology and risk-aware access control framework for cyber-physical space

Y Cao, Z Huang, Y Yu, C Ke, Z Wang - Frontiers of Computer Science, 2020 - Springer
Cyber-physical space is a spatial environment that integrates the cyber world and the
physical world, aiming to provide an intelligent environment for users to conduct their day-to …

Self-generation of access control policies

S Calo, D Verma, S Chakraborty, E Bertino… - Proceedings of the …, 2018 - dl.acm.org
Access control for information has primarily focused on access statically granted to subjects
by administrators usually in the context of a specific system. Even if mechanisms are …

G-sir: an insider attack resilient geo-social access control framework

N Baracaldo, B Palanisamy… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Insider attacks are among the most dangerous and costly attacks to organizations. These
attacks are carried out by individuals who are legitimately authorized to access the system …

Towards a privacy-aware quantified self data management framework

B Thuraisingham, M Kantarcioglu, E Bertino… - Proceedings of the …, 2018 - dl.acm.org
Massive amounts of data are being collected, stored, and analyzed for various business and
marketing purposes. While such data analysis is critical for many applications, it could also …

A formal proximity model for RBAC systems

A Gupta, MS Kirkpatrick, E Bertino - Computers & Security, 2014 - Elsevier
To combat the threat of information leakage through pervasive access, researchers have
proposed several extensions to the popular role-based access control (RBAC) model. Such …

Access control models for geo-social computing systems

E Tarameshloo, PWL Fong - Proceedings of the 19th ACM symposium …, 2014 - dl.acm.org
A Geo-Social Computing System (GSCS) allows users to declare their current locations, and
uses these declared locations to make authorization decisions. Recent years have seen the …

A model-driven approach to representing and checking RBAC contextual policies

A Ben Fadhel, D Bianculli, L Briand… - Proceedings of the Sixth …, 2016 - dl.acm.org
Among the various types of Role-based access control (RBAC) policies proposed in the
literature, contextual policies take into account the user's location and the time at which she …