Current research and open problems in attribute-based access control
D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …
A survey of context-aware access control mechanisms for cloud and fog networks: Taxonomy and open research issues
Over the last few decades, the proliferation of the Internet of Things (IoT) has produced an
overwhelming flow of data and services, which has shifted the access control paradigm from …
overwhelming flow of data and services, which has shifted the access control paradigm from …
GEO-RBAC: a spatially aware RBAC
Securing access to data in location-based services and mobile applications requires the
definition of spatially aware access-control systems. Even if some approaches have already …
definition of spatially aware access-control systems. Even if some approaches have already …
A trust-based context-aware access control model for web-services
R Bhatti, E Bertino, A Ghafoor - Distributed and Parallel Databases, 2005 - Springer
A key challenge in Web services security is the design of effective access control schemes
that can adequately meet the unique security challenges posed by the Web services …
that can adequately meet the unique security challenges posed by the Web services …
Securecloud: Towards a comprehensive security framework for cloud computing environments
Cloud computing has recently gained tremendous momentum but still is in its infancy. It has
the potential for significant cost reduction and the increased operating efficiencies in …
the potential for significant cost reduction and the increased operating efficiencies in …
[KİTAP][B] Security for web services and service-oriented architectures
Web services technologies are advancing fast and being extensively deployed in many di?
erent application environments. Web services based on the eXt-sible Markup Language …
erent application environments. Web services based on the eXt-sible Markup Language …
Roles in information security–a survey and classification of the research area
The concept of roles has been prevalent in the area of Information Security for more than 15
years already. It promises simplified and flexible user management, reduced administrative …
years already. It promises simplified and flexible user management, reduced administrative …
A policy model and framework for context-aware access control to information resources
In today's dynamic ICT environments, the ability to control users' access to information
resources and services has become ever important. On the one hand, it should provide …
resources and services has become ever important. On the one hand, it should provide …
Generative policy model for autonomic management
Policy-based mechanisms have been effectively used to realize autonomic behavior in the
constituent elements of distributed systems. However, current prevalent policy models based …
constituent elements of distributed systems. However, current prevalent policy models based …
Critical situation management utilizing IoT-based data resources through dynamic contextual role modeling and activation
New opportunities have been created for the management of critical situations utilizing the
Internet of Things (IoT). However, one of the difficulties in providing services for critical …
Internet of Things (IoT). However, one of the difficulties in providing services for critical …