A survey of role mining

B Mitra, S Sural, J Vaidya, V Atluri - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Role-Based Access Control (RBAC) is the most widely used model for advanced access
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …

Sok: context and risk aware access control for zero trust systems

S **ao, Y Ye, N Kanwal, T Newe… - Security and …, 2022 - Wiley Online Library
Evolving computing technologies such as cloud, edge computing, and the Internet of Things
(IoT) are creating a more complex, dispersed, and dynamic enterprise operational …

[HTML][HTML] Medical big data access control model based on UPHFPR and evolutionary game

R Jiang, S Han, Y Zhang, T Chen, J Song - Alexandria Engineering Journal, 2022 - Elsevier
This paper discusses how to improve the accuracy of doctors' diagnosis and how to protect
the security of patients' information. First, UPHFPR (Uncertain Probability Hesitant Fuzzy …

Specification, validation, and enforcement of a generalized spatio-temporal role-based access control model

R Abdunabi, M Al-Lail, I Ray… - IEEE Systems Journal, 2013 - ieeexplore.ieee.org
With the advent of wireless and mobile devices, many new applications are being
developed that make use of the spatio-temporal information of a user to provide better …

Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database

MP Singh, S Sural, J Vaidya, V Atluri - Computers & security, 2019 - Elsevier
Over the last few years, various types of access control models have been proposed for
expressing the growing needs of organizations. Out of these, there is an increasing interest …

Security analysis of ABAC under an administrative model

S Jha, S Sural, V Atluri, J Vaidya - IET information security, 2019 - Wiley Online Library
In the present‐day computing environment, where access control decisions are often
dependent on contextual information like the location of the requesting user and the time of …

A role-based administrative model for administration of heterogeneous access control policies and its security analysis

MP Singh, S Sural, J Vaidya, V Atluri - Information Systems Frontiers, 2021 - Springer
Over the past few years, several efforts have been made to enable specification and
enforcement of flexible and dynamic access control policies using traditional access control …

Context-aware role mining for mobile service recommendation

J Wang, C Zeng, C He, L Hong, L Zhou… - Proceedings of the 27th …, 2012 - dl.acm.org
Finding and recommending suitable services for mobile users are increasingly important
due to the popularity of mobile Internet. While recent research has attempted to use role …

ERBAC: event-driven RBAC

P Bonatti, C Galdi, D Torres - Proceedings of the 18th ACM symposium …, 2013 - dl.acm.org
Context-aware access control systems should reactively adapt access control decisions to
dynamic environmental conditions. In this paper we present an extension of the TRBAC …

An administrative model for collaborative management of ABAC systems and its security analysis

S Jha, S Sural, V Atluri, J Vaidya - 2016 IEEE 2nd International …, 2016 - ieeexplore.ieee.org
Attribute-based Access Control (ABAC) has been emerging as a suitable choice for large
and federated enterprises due to its flexibility in expressing various types of security policies …