Provably secure role-based encryption with revocation mechanism
Abstract Role-Based Encryption (RBE) realizes access control mechanisms over encrypted
data according to the widely adopted hierarchical RBAC model. In this paper, we present a …
data according to the widely adopted hierarchical RBAC model. In this paper, we present a …
Dynamic delegation framework for role based access control in distributed data management systems
C Ruan, V Varadharajan - Distributed and Parallel Databases, 2014 - Springer
This paper proposes a logic based framework that extends role based access control
systems with dynamic delegation in a decentralised environment. It allows delegation of …
systems with dynamic delegation in a decentralised environment. It allows delegation of …
A model for trust-based access control and delegation in mobile clouds
Multi-tenancy, elasticity and dynamicity pose several novel challenges for access control in
mobile smartphone clouds such as the Android \textsuperscript\texttrademark cloud …
mobile smartphone clouds such as the Android \textsuperscript\texttrademark cloud …
Trust-aware RBAC
V Oleshchuk - … Network Security: 6th International Conference on …, 2012 - Springer
In this paper we propose a trust-aware enhancement of RBAC (TA-RBAC) that takes
trustworthiness of users into consideration explicitly before granting access. We assume that …
trustworthiness of users into consideration explicitly before granting access. We assume that …
[PDF][PDF] Enhancing Workflow Systems Resiliency by Using Delegation and Priority Concepts.
H El Bakkali - J. Digit. Inf. Manag., 2013 - dline.info
Enforcing dynamic access control constraints in workflow management systems (WFMS) is a
very important requirement with regard to security issues. However, respecting those …
very important requirement with regard to security issues. However, respecting those …
I-rbac: Isolation enabled role-based access control
N Gunti, W Sun, M Niamat - 2011 Ninth Annual International …, 2011 - ieeexplore.ieee.org
Access control is a means by which the ability to access the system is explicitly enabled or
restricted in some way. Access control system enables an authority to control access to …
restricted in some way. Access control system enables an authority to control access to …
Delegation Security Analysis in Workflow Systems
User delegation is a type of access control mechanisms that allow a person to delegate all
or part of his her authorities to others. It is an important access control policy that can …
or part of his her authorities to others. It is an important access control policy that can …
Access control models for pervasive computing environments
M Toahchoodee - 2010 - search.proquest.com
With the growing advancement of pervasive computing technologies, we are moving
towards an era where context information will be necessary for access control. Traditional …
towards an era where context information will be necessary for access control. Traditional …
A Graph-Based Formal Access Control Model to Support Positive & Negative Permissions, Exceptions, Redundancy & Conflict Detection, Permission to Delegate …
AH Alkhorem - 2024 - search.proquest.com
Access control policies models provide effective approach to control users actives to allow or
deny action to user or group within the resources. This mechanism allowed us to verify the …
deny action to user or group within the resources. This mechanism allowed us to verify the …
A task ordering approach for automatic trust establishment
Trust has become essential in computer science as a way of assisting the process of
decision-making, such as access control. In any system, several tasks may be performed …
decision-making, such as access control. In any system, several tasks may be performed …