Privacy preservation of electronic health records in the modern era: A systematic survey

R Nowrozy, K Ahmed, ASM Kayes, H Wang… - ACM Computing …, 2024 - dl.acm.org
Building a secure and privacy-preserving health data sharing framework is a topic of great
interest in the healthcare sector, but its success is subject to ensuring the privacy of user …

Current research and open problems in attribute-based access control

D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …

AuthPrivacyChain: A blockchain-based access control framework with privacy protection in cloud

C Yang, L Tan, N Shi, B Xu, Y Cao, K Yu - Ieee Access, 2020 - ieeexplore.ieee.org
Cloud is a computing model that provides sharing and supports ubiquitous on-demand
access computing, providing new data processing and services for many industries …

RABAC: role-centric attribute-based access control

X **, R Sandhu, R Krishnan - International Conference on Mathematical …, 2012 - Springer
Role-based access control (RBAC) is a commercially dominant model, standardized by the
National Institute of Standards and Technology (NIST). Although RBAC provides compelling …

PARBAC: Priority-attribute-based RBAC model for azure IoT cloud

A Thakare, E Lee, A Kumar, VB Nikam… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Duties are segregated within a team by using the role-based access control (RBAC) in the
Azure Internet of Things (IoT) framework, and only an appropriate level of access is granted …

Optimization of access control policies

S Kern, T Baumer, S Groll, L Fuchs, G Pernul - Journal of Information …, 2022 - Elsevier
Organizations undertake complex and costly projects to model high-quality Access Control
Policies (ACPs). Once built, these policies must be maintained and managed in an ongoing …

Towards digital engineering: the advent of digital systems engineering

J Huang, A Gheorghe, H Handley… - … Journal of System …, 2020 - inderscienceonline.com
Digital engineering, the digital transformation of engineering to leverage digital
technologies, is coming globally. This paper explores digital systems engineering, which …

Attributes enhanced role-based access control model

QM Rajpoot, CD Jensen, R Krishnan - Trust, Privacy and Security in Digital …, 2015 - Springer
Attribute-based access control (ABAC) and role-based access control (RBAC) are currently
the two most popular access control models. Yet, they both have known limitations and offer …

Integrating attributes into role-based access control

QM Rajpoot, CD Jensen, R Krishnan - … and Privacy XXIX: 29th Annual IFIP …, 2015 - Springer
Role-based access control (RBAC) and attribute-based access control (ABAC) are currently
the most prominent access control models. However, they both suffer from limitations and …

Deploying ABAC policies using RBAC systems

G Batra, V Atluri, J Vaidya… - Journal of computer …, 2019 - journals.sagepub.com
The flexibility, portability and identity-less access control features of Attribute Based Access
Control (ABAC) make it an attractive choice to be employed in many application domains …