OpenSec: Policy-based security using software-defined networking

A Lara, B Ramamurthy - IEEE transactions on network and …, 2016 - ieeexplore.ieee.org
As the popularity of software-defined networks (SDN) and OpenFlow increases, policy-
driven network management has received more attention. Manual configuration of multiple …

An attribute-based authorization policy framework with dynamic conflict resolution

A Mohan, DM Blough - Proceedings of the 9th Symposium on Identity …, 2010 - dl.acm.org
Policy-based authorization systems are becoming more common as information systems
become larger and more complex. In these systems, to authorize a requester to access a …

A privacy-preserving architecture and data-sharing model for cloud-IoT applications

M Fernández, J Jaimunk… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Many service providers offer their services in exchange for users' private data. Despite new
regulations created to protect users privacy, users are often given little choice over the way …

Specification and analysis of ABAC policies via the category-based metamodel

M Fernández, I Mackie, B Thuraisingham - Proceedings of the Ninth …, 2019 - dl.acm.org
The Attribute-Based Access Control (ABAC) model is one of the most powerful access
control models in use. It subsumes popular models, such as the Role-Based Access Control …

[HTML][HTML] A graph-based framework for the analysis of access control policies

S Alves, M Fernández - Theoretical Computer Science, 2017 - Elsevier
We design a graph-based framework for the analysis of access control policies that aims at
easing the specification and verification tasks for security administrators. We consider …

A data access model for privacy-preserving cloud-IoT architectures

M Fernández, A Franch Tapia, J Jaimunk… - Proceedings of the 25th …, 2020 - dl.acm.org
We propose a novel data collection and data sharing model for cloud-IoT architectures with
an emphasis on data privacy. This model has been implemented in Privasee, an open …

Separating the Siamese twins: a proposed methodology for differentiating between privacy and security

RS Hirschprung - Behaviour & Information Technology, 2024 - Taylor & Francis
Security and privacy have become major issues. Although no one seriously claims that
privacy and security are identical, most sources treat them as if they are. Differentiating …

Policy framework for security and privacy management

J Karat, CM Karat, E Bertino, N Li, Q Ni… - IBM Journal of …, 2009 - ieeexplore.ieee.org
Policies that address security and privacy are pervasive parts of both technical and social
systems, and technology that enables both organizations and individuals to create and …

A risk-benefit driven architecture for personal data release

BC Singh, B Carminati, E Ferrari - 2016 IEEE 17th International …, 2016 - ieeexplore.ieee.org
Personal data storages (PDSs) give individuals the ability to store their personal data in a
data unified repository and control release of their data to data consumers. Being able to …

Dynamic privacy adaptation in ubiquitous computing

FM Schaub - 2014 - oparu.uni-ulm.de
Ubiquitous computing is characterized by the integration of computing aspects into the
physical environment. Physical objects gain digital sensing, processing, and communication …