Current research and open problems in attribute-based access control

D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …

A survey of context-aware access control mechanisms for cloud and fog networks: Taxonomy and open research issues

ASM Kayes, R Kalaria, IH Sarker, MS Islam, PA Watters… - Sensors, 2020 - mdpi.com
Over the last few decades, the proliferation of the Internet of Things (IoT) has produced an
overwhelming flow of data and services, which has shifted the access control paradigm from …

GEO-RBAC: a spatially aware RBAC

ML Damiani, E Bertino, B Catania… - ACM Transactions on …, 2007 - dl.acm.org
Securing access to data in location-based services and mobile applications requires the
definition of spatially aware access-control systems. Even if some approaches have already …

A trust-based context-aware access control model for web-services

R Bhatti, E Bertino, A Ghafoor - Distributed and Parallel Databases, 2005 - Springer
A key challenge in Web services security is the design of effective access control schemes
that can adequately meet the unique security challenges posed by the Web services …

Securecloud: Towards a comprehensive security framework for cloud computing environments

H Takabi, JBD Joshi, GJ Ahn - 2010 IEEE 34th Annual …, 2010 - ieeexplore.ieee.org
Cloud computing has recently gained tremendous momentum but still is in its infancy. It has
the potential for significant cost reduction and the increased operating efficiencies in …

[KİTAP][B] Security for web services and service-oriented architectures

E Bertino, L Martino, F Paci, A Squicciarini - 2010 - Springer
Web services technologies are advancing fast and being extensively deployed in many di?
erent application environments. Web services based on the eXt-sible Markup Language …

Roles in information security–a survey and classification of the research area

L Fuchs, G Pernul, R Sandhu - computers & security, 2011 - Elsevier
The concept of roles has been prevalent in the area of Information Security for more than 15
years already. It promises simplified and flexible user management, reduced administrative …

A policy model and framework for context-aware access control to information resources

ASM Kayes, J Han, W Rahayu, T Dillon… - The Computer …, 2019 - academic.oup.com
In today's dynamic ICT environments, the ability to control users' access to information
resources and services has become ever important. On the one hand, it should provide …

Generative policy model for autonomic management

D Verma, S Calo, S Chakraborty… - … Advanced & Trusted …, 2017 - ieeexplore.ieee.org
Policy-based mechanisms have been effectively used to realize autonomic behavior in the
constituent elements of distributed systems. However, current prevalent policy models based …

Critical situation management utilizing IoT-based data resources through dynamic contextual role modeling and activation

ASM Kayes, W Rahayu, T Dillon - Computing, 2019 - Springer
New opportunities have been created for the management of critical situations utilizing the
Internet of Things (IoT). However, one of the difficulties in providing services for critical …