Current research and open problems in attribute-based access control

D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …

Database security-concepts, approaches, and challenges

E Bertino, R Sandhu - IEEE Transactions on Dependable and …, 2005 - ieeexplore.ieee.org
As organizations increase their reliance on, possibly distributed, information systems for
daily business, they become more vulnerable to security breaches even as they gain …

Information security and privacy in healthcare: current state of research

A Appari, ME Johnson - International journal of Internet and …, 2010 - inderscienceonline.com
Information security and privacy in the healthcare sector is an issue of growing importance.
The adoption of digital patient records, increased regulation, provider consolidation and the …

[HTML][HTML] Publishing data from electronic health records while preserving privacy: A survey of algorithms

A Gkoulalas-Divanis, G Loukides, J Sun - Journal of biomedical informatics, 2014 - Elsevier
Abstract The dissemination of Electronic Health Records (EHRs) can be highly beneficial for
a range of medical studies, spanning from clinical trials to epidemic control studies, but it …

Dynamic role-based access control policy for smart grid applications: an offline deep reinforcement learning approach

G Fragkos, J Johnson… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Role-based access control (RBAC) is adopted in the information and communication
technology domain for authentication purposes. However, due to a very large number of …

Multiparty access control for online social networks: model and mechanisms

H Hu, GJ Ahn, J Jorgensen - IEEE transactions on knowledge …, 2012 - ieeexplore.ieee.org
Online social networks (OSNs) have experienced tremendous growth in recent years and
become a de facto portal for hundreds of millions of Internet users. These OSNs offer …

A survey on empirical security analysis of access-control systems: a real-world perspective

S Parkinson, S Khan - ACM Computing Surveys, 2022 - dl.acm.org
There any many different access-control systems, yet a commonality is that they provide
flexible mechanisms to enforce different access levels. Their importance in organisations to …

Usage control in computer security: A survey

A Lazouski, F Martinelli, P Mori - Computer Science Review, 2010 - Elsevier
Protecting access to digital resources is one of the fundamental problems recognized in
computer security. As yet it remains a challenging problem to work out, starting from the …

Survey of access control models and technologies for cloud computing

F Cai, N Zhu, J He, P Mu, W Li, Y Yu - Cluster Computing, 2019 - Springer
Access control is an important measure for the protection of information and system
resources to prevent illegitimate users from getting access to protected objects and …

Ontology-based access control model for security policy reasoning in cloud computing

C Choi, J Choi, P Kim - The Journal of Supercomputing, 2014 - Springer
There are many security issues in cloud computing service environments, including
virtualization, distributed big-data processing, serviceability, traffic management, application …