OpenSec: Policy-based security using software-defined networking
As the popularity of software-defined networks (SDN) and OpenFlow increases, policy-
driven network management has received more attention. Manual configuration of multiple …
driven network management has received more attention. Manual configuration of multiple …
An attribute-based authorization policy framework with dynamic conflict resolution
Policy-based authorization systems are becoming more common as information systems
become larger and more complex. In these systems, to authorize a requester to access a …
become larger and more complex. In these systems, to authorize a requester to access a …
A privacy-preserving architecture and data-sharing model for cloud-IoT applications
Many service providers offer their services in exchange for users' private data. Despite new
regulations created to protect users privacy, users are often given little choice over the way …
regulations created to protect users privacy, users are often given little choice over the way …
Specification and analysis of ABAC policies via the category-based metamodel
The Attribute-Based Access Control (ABAC) model is one of the most powerful access
control models in use. It subsumes popular models, such as the Role-Based Access Control …
control models in use. It subsumes popular models, such as the Role-Based Access Control …
[HTML][HTML] A graph-based framework for the analysis of access control policies
We design a graph-based framework for the analysis of access control policies that aims at
easing the specification and verification tasks for security administrators. We consider …
easing the specification and verification tasks for security administrators. We consider …
A data access model for privacy-preserving cloud-IoT architectures
We propose a novel data collection and data sharing model for cloud-IoT architectures with
an emphasis on data privacy. This model has been implemented in Privasee, an open …
an emphasis on data privacy. This model has been implemented in Privasee, an open …
Separating the Siamese twins: a proposed methodology for differentiating between privacy and security
RS Hirschprung - Behaviour & Information Technology, 2024 - Taylor & Francis
Security and privacy have become major issues. Although no one seriously claims that
privacy and security are identical, most sources treat them as if they are. Differentiating …
privacy and security are identical, most sources treat them as if they are. Differentiating …
Policy framework for security and privacy management
Policies that address security and privacy are pervasive parts of both technical and social
systems, and technology that enables both organizations and individuals to create and …
systems, and technology that enables both organizations and individuals to create and …
A risk-benefit driven architecture for personal data release
Personal data storages (PDSs) give individuals the ability to store their personal data in a
data unified repository and control release of their data to data consumers. Being able to …
data unified repository and control release of their data to data consumers. Being able to …
Dynamic privacy adaptation in ubiquitous computing
FM Schaub - 2014 - oparu.uni-ulm.de
Ubiquitous computing is characterized by the integration of computing aspects into the
physical environment. Physical objects gain digital sensing, processing, and communication …
physical environment. Physical objects gain digital sensing, processing, and communication …