Current research and open problems in attribute-based access control
D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …
Database security-concepts, approaches, and challenges
As organizations increase their reliance on, possibly distributed, information systems for
daily business, they become more vulnerable to security breaches even as they gain …
daily business, they become more vulnerable to security breaches even as they gain …
Information security and privacy in healthcare: current state of research
Information security and privacy in the healthcare sector is an issue of growing importance.
The adoption of digital patient records, increased regulation, provider consolidation and the …
The adoption of digital patient records, increased regulation, provider consolidation and the …
[HTML][HTML] Publishing data from electronic health records while preserving privacy: A survey of algorithms
Abstract The dissemination of Electronic Health Records (EHRs) can be highly beneficial for
a range of medical studies, spanning from clinical trials to epidemic control studies, but it …
a range of medical studies, spanning from clinical trials to epidemic control studies, but it …
Dynamic role-based access control policy for smart grid applications: an offline deep reinforcement learning approach
Role-based access control (RBAC) is adopted in the information and communication
technology domain for authentication purposes. However, due to a very large number of …
technology domain for authentication purposes. However, due to a very large number of …
Multiparty access control for online social networks: model and mechanisms
Online social networks (OSNs) have experienced tremendous growth in recent years and
become a de facto portal for hundreds of millions of Internet users. These OSNs offer …
become a de facto portal for hundreds of millions of Internet users. These OSNs offer …
A survey on empirical security analysis of access-control systems: a real-world perspective
There any many different access-control systems, yet a commonality is that they provide
flexible mechanisms to enforce different access levels. Their importance in organisations to …
flexible mechanisms to enforce different access levels. Their importance in organisations to …
Usage control in computer security: A survey
Protecting access to digital resources is one of the fundamental problems recognized in
computer security. As yet it remains a challenging problem to work out, starting from the …
computer security. As yet it remains a challenging problem to work out, starting from the …
Survey of access control models and technologies for cloud computing
F Cai, N Zhu, J He, P Mu, W Li, Y Yu - Cluster Computing, 2019 - Springer
Access control is an important measure for the protection of information and system
resources to prevent illegitimate users from getting access to protected objects and …
resources to prevent illegitimate users from getting access to protected objects and …
Ontology-based access control model for security policy reasoning in cloud computing
There are many security issues in cloud computing service environments, including
virtualization, distributed big-data processing, serviceability, traffic management, application …
virtualization, distributed big-data processing, serviceability, traffic management, application …