[HTML][HTML] Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN

L Golightly, P Modesti, R Garcia, V Chang - Cyber Security and Applications, 2023 - Elsevier
Access Control is a crucial defense mechanism organizations can deploy to meet modern
cybersecurity needs and legal compliance with data privacy. The aim is to prevent …

Database security-concepts, approaches, and challenges

E Bertino, R Sandhu - IEEE Transactions on Dependable and …, 2005 - ieeexplore.ieee.org
As organizations increase their reliance on, possibly distributed, information systems for
daily business, they become more vulnerable to security breaches even as they gain …

A unified attribute-based access control model covering DAC, MAC and RBAC

X **, R Krishnan, R Sandhu - Data and Applications Security and Privacy …, 2012 - Springer
Recently, there has been considerable interest in attribute based access control (ABAC) to
overcome the limitations of the dominant access control models (ie, discretionary-DAC …

The android platform security model

R Mayrhofer, JV Stoep, C Brubaker… - ACM Transactions on …, 2021 - dl.acm.org
Android is the most widely deployed end-user focused operating system. With its growing
set of use cases encompassing communication, navigation, media consumption …

A logic-based framework for attribute based access control

L Wang, D Wijesekera, S Jajodia - … of the 2004 ACM workshop on …, 2004 - dl.acm.org
Attribute based access control (ABAC) grants accesses to services based on the attributes
possessed by the requester. Thus, ABAC differs from the traditional discretionary access …

SecPAL: Design and semantics of a decentralized authorization language

MY Becker, C Fournet… - Journal of Computer …, 2010 - journals.sagepub.com
We present a declarative authorization language. Policies and credentials are expressed
using predicates defined by logical clauses, in the style of constraint logic programming …

Formal model and policy specification of usage control

X Zhang, F Parisi-Presicce, R Sandhu… - ACM Transactions on …, 2005 - dl.acm.org
The recent usage control model (UCON) is a foundation for next-generation access control
models with distinguishing properties of decision continuity and attribute mutability. A usage …

Survey on access control for community-centered collaborative systems

F Paci, A Squicciarini, N Zannone - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The last decades have seen a growing interest and demand for community-centered
collaborative systems and platforms. These systems and platforms aim to provide an …

A privacy policy model for enterprises

G Karjoth, M Schunter - Proceedings 15th IEEE computer …, 2002 - ieeexplore.ieee.org
Privacy is an increasing concern in the marketplace. Although enterprises promise sound
privacy practices to their customers, there is no technical mechanism to enforce them …

Analyzing Integrity Protection in the {SELinux} Example Policy

T Jaeger, R Sailer, X Zhang - 12th USENIX Security Symposium …, 2003 - usenix.org
In this paper, we present an approach for analyzing the integrity protection in the SELinux
example policy. The SELinux example policy is intended as an example from which …