A systematic literature review for authorization and access control: definitions, strategies and models

AKYS Mohamed, D Auer, D Hofer… - International journal of web …, 2022 - emerald.com
Purpose Authorization and access control have been a topic of research for several
decades. However, existing definitions are inconsistent and even contradicting each other …

A Comprehensive Review on Granularity Perspective of the Access Control Models in Cloud Computing

AK Routh, P Ranjan - 2024 IEEE International Conference on …, 2024 - ieeexplore.ieee.org
In this review, we explore into the critical realm of access control in cloud computing, a
fundamental component ensuring data and resource confidentiality, integrity, and …

Understanding security challenges and defending access control models for Cloud-based Internet of Things network

P Zambare, Y Liu - IFIP International Internet of Things Conference, 2023 - Springer
Access control is one of the most important measures for protecting information and system
resources because it prevents unauthorized users from gaining access to protected objects …

Extended authorization policy for graph-structured data

A Mohamed, D Auer, D Hofer, J Küng - SN Computer Science, 2021 - Springer
The high increase in the use of graph databases also for business-and privacy-critical
applications demands for a sophisticated, flexible, fine-grained authorization and access …

Методика обнаружения аномалий и кибератак на основе интеграции методов фрактального анализа и машинного обучения

ИВ Котенко, ИБ Саенко, ОС Лаута… - Информатика и …, 2022 - mathnet.ru
В современных сетях передачи данных для постоянного мониторинга сетевого
трафика и обнаружения в нем аномальной активности, а также идентификации и …

Inter‐Cloud Data Security Framework to Build Trust Based on Compliance with Controls

SI Akhtar, A Rauf, MF Amjad, I Batool - IET Information Security, 2024 - Wiley Online Library
Prospects of cloud computing as a technology that optimizes resources, reduces complexity,
and provides cost‐effective solutions to its consumers are well established. The future of …

Anomaly and cyber attack detection technique based on the integration of fractal analysis and machine learning methods

IV Kotenko, IB Saenko, OS Lauta… - Informatics and …, 2022 - journals.rcsi.science
In modern data transmission networks, in order to constantly monitor network traffic and
detect abnormal activity in it, as well as identify and classify cyber attacks, it is necessary to …

Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review

A Mohammad - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
As the functionality and services provided by cloud computing increase, control access to
these services becomes more complex, and more security breaches are generated. This is …

[HTML][HTML] Blockchain-enhanced smart contracts for formal verification of IoT access control mechanisms

Z Guo - Alexandria Engineering Journal, 2025 - Elsevier
Abstract Technologies like Bluetooth and WiFi enable more and more devices to become
interconnected, forming the IoT ecosystem. However, this growing connectivity brings …

Adaptive access control mechanism (AACM) for enterprise cloud computing

A Kaur, A Verma - Journal of Electrical and Computer …, 2023 - Wiley Online Library
Enterprise cloud computing provides various services to enterprises, but access to these
services is controlled by a firewall. The firewall determines the actions and operations a …