A systematic literature review for authorization and access control: definitions, strategies and models
Purpose Authorization and access control have been a topic of research for several
decades. However, existing definitions are inconsistent and even contradicting each other …
decades. However, existing definitions are inconsistent and even contradicting each other …
Blockchain-based secured access control in an IoT system
The distributed nature of Internet of Things (IoT) and its rapid increase on a large scale
raises many security and privacy issues. Access control is one of the major challenges …
raises many security and privacy issues. Access control is one of the major challenges …
A study on current research and challenges in attribute-based access control model
K Vijayalakshmi, V Jayalakshmi - … and Internet of Things: Proceedings of …, 2022 - Springer
Access control models are used to identify and detect anonymous users or attacks when
sharing big data or other resources in the distributed environment such as cloud, edge, and …
sharing big data or other resources in the distributed environment such as cloud, edge, and …
Secure data sharing in the cloud
Secure Data Sharing in the Cloud | SpringerLink Skip to main content Advertisement
SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart …
SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart …
[HTML][HTML] Design of cloud security in the EHR for Indian healthcare services
P Deshmukh - Journal of King Saud university-computer and …, 2017 - Elsevier
An ease of data or record sharing at will has compelled most of the physicians to adopt EHR
(Electronic Health Record) for record-kee** of patients. It also makes convenient to the …
(Electronic Health Record) for record-kee** of patients. It also makes convenient to the …
Formal definition and analysis of access control model based on role and attribute
H Qi, X Di, J Li - Journal of information security and applications, 2018 - Elsevier
Integration of role-based access control model (RBAC) and attribute-based access control
model (ABAC) has become a hot area of access control research recently. A lot of access …
model (ABAC) has become a hot area of access control research recently. A lot of access …
A survey of access control models in wireless sensor networks
Wireless sensor networks (WSNs) have attracted considerable interest in the research
community, because of their wide range of applications. However, due to the distributed …
community, because of their wide range of applications. However, due to the distributed …
[HTML][HTML] Linear time algorithms to restrict insider access using multi-policy access control systems
An important way to limit malicious insiders from distributing sensitive information is to as
tightly as possible limit their access to information. This has always been the goal of access …
tightly as possible limit their access to information. This has always been the goal of access …
[PDF][PDF] A survey of access control and data encryption for database security
EF Khalaf, MM Kadi - Journal of King Abdulaziz University, 2017 - kau.edu.sa
With the vast amount of data generated nowadays, organizing and managing of these data
are very important to allow the users to access, retrieve, and update their data by using …
are very important to allow the users to access, retrieve, and update their data by using …
Shared access control models for big data: a perspective study and analysis
K Vijayalakshmi, V Jayalakshmi - Proceedings of International Conference …, 2021 - Springer
With the rapid development of information technology and the Internet, the data owners can
avail of the cloud storage to store their vast amounts of data. Data and all resources are …
avail of the cloud storage to store their vast amounts of data. Data and all resources are …