HEAD Access Control Metamodel: Distinct Design, Advanced Features, and New Opportunities

N Kashmar, M Adda, H Ibrahim - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
Access control (AC) policies are a set of rules administering decisions in systems and they
are increasingly used for implementing flexible and adaptive systems to control access in …

Leakage-suppressed range query scheme for structured data in IoT

J Gao, X Liu, X Li, B Wang - IEEE Systems Journal, 2021 - ieeexplore.ieee.org
The structured data collected by the Internet of Things can be encrypted for protecting the
user's privacy. Range query can be used to get the expected data with some specific …

MA-MOrBAC: A distributed access control model based on mobile agent for multi-organizational, collaborative and heterogeneous systems

Z Ben Yahya, F Barika Ktata, K Ghédira - … on Risks and Security of Internet …, 2017 - Springer
Facing the current evolution of networks infrastructure and the expansion of the information
system in organizations and businesses, protecting data and resources against …

Access Control in Mobile Crowdsensing: Requirements, Challenges and Open Issues

H El Gadi, H El Bakkali, D Benhaddou… - Science and Information …, 2023 - Springer
Many industries, including smart cities, healthcare, and others, have undergone radical
change due to the fast-growing number of smart devices and associated sensors. Mobile …

TX 77204, USA

H El Gadi¹, H El Bakkali¹, D Benhaddou… - … : Proceedings of the …, 2023 - books.google.com
Many industries, including smart cities, healthcare, and others, have undergone radical
change due to the fast-growing number of smart devices and associated sensors. Mobile …

Mimir: a term-distributed retrieval system for secret documents

G Gao, R Li, Z Xu - International Journal of Information and …, 2018 - inderscienceonline.com
In order to access sensitive documents shared over government, army and enterprise
intranets, users rely on an indexing facility where they can quickly locate relevant documents …

Reflection on building hybrid access control by configuring RBAC and MAC features

DK Kim, H Ming, L Lu - 2020 IEEE 27th International …, 2020 - ieeexplore.ieee.org
This paper reflects on the paper titled Building Hybrid Access Control by Configuring RBAC
and MAC Features which was published in Information and System Technology, 2014. The …

A Formal Approach to Secure the Segmentation and Configuration of Dynamic Networks

M Alabbad - 2021 - macsphere.mcmaster.ca
Network segmentation and layered protection are critical strategies used in building and
designing secure networks. Although they are recommended by security practitioners and …

Managing CSCW's users in scripting language

Z Idrus, SZZ Abidin, N Omar - 2015 Fourth International …, 2015 - ieeexplore.ieee.org
In computer supported cooperative work (CSCW), users work together from remote locations
where each of them performs specific roles. However, their roles are dynamic and they …