Usage control in computer security: A survey

A Lazouski, F Martinelli, P Mori - Computer Science Review, 2010 - Elsevier
Protecting access to digital resources is one of the fundamental problems recognized in
computer security. As yet it remains a challenging problem to work out, starting from the …

How to securely break into RBAC: the BTG-RBAC model

A Ferreira, D Chadwick, P Farinha… - 2009 Annual …, 2009 - ieeexplore.ieee.org
Access control models describe frameworks that dictate how subjects (eg users) access
resources. In the role-based access control (RBAC) model access to resources is based on …

Emergency role-based access control (E-RBAC) and analysis of model specifications with alloy

F Nazerian, H Motameni, H Nematzadeh - Journal of information security …, 2019 - Elsevier
In role-based access control (RBAC), users gain access to predetermined roles and
permissions. Thus, desired results are not achieved in emergency situations through policy …

A novel reference security model with the situation based access policy for accessing ephr data

P Gope, R Amin - Journal of medical systems, 2016 - Springer
Abstract Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to
share his/her health records securely with healthcare professional but also to control his/her …

Hardware-accelerated reconstruction of polygonal isosurface representations on unstructured grids

T Klein, S Stegmaier, T Ertl - 12th Pacific Conference on …, 2004 - ieeexplore.ieee.org
Volume visualization using isosurface extraction is a well-researched topic. Research
demonstrated that even for unstructured grids peak performances of millions of tetrahedra …

Usable access control policy and model for healthcare

A Ferreira, R Correia, M Brito… - 2011 24th International …, 2011 - ieeexplore.ieee.org
Access control defines what users can perform within a system. It is usually defined by
software engineers and end users are seldom asked for cooperation. The main objective of …

Modeling support for role-based delegation in process-aware information systems

S Schefer-Wenzl, M Strembeck - Business & Information Systems …, 2014 - Springer
In the paper, an integrated approach for the modeling and enforcement of delegation
policies in process-aware information systems is presented. In particular, a delegation …

Beyond accountability: using obligations to reduce risk exposure and deter insider attacks

N Baracaldo, J Joshi - Proceedings of the 18th ACM symposium on …, 2013 - dl.acm.org
Recently, the importance of including obligations as part of access control systems for
privilege management, for example, in healthcare information systems, has been well …

[PDF][PDF] Towards an extension of RBAC model

A BOUADJEMI, MK ABDI - … Journal of Computing and Digital Systems, 2020 - academia.edu
SystemsRole-based access control (RBAC) has been widely used in information systems
including so-called critical systems. Access control models describe the frameworks that …

Ts-RBAC: A RBAC model with transformation

G Liu, R Zhang, H Song, C Wang, J Liu, A Liu - Computers & Security, 2016 - Elsevier
The traditional role-based access control (RBAC) model is typically static, ie, permissions
are granted based on a policy that seldom changes. A more flexible support for access …