Dynamic access control and authorization system based on zero-trust architecture

Q Yao, Q Wang, X Zhang, J Fei - … of the 2020 1st international conference …, 2020 - dl.acm.org
With the development of cloud computing, artificial intelligence, big data and other
technologies, network systems are facing more and more security risks and threats. The …

Self-adaptive and secure mechanism for IoT based multimedia services: a survey

I Singh, SW Lee - Multimedia Tools and Applications, 2022 - Springer
With the advent of internet of things (IoT) and IoT multimedia services in real-time
applications, including smart healthcare, smart home, and smart connected transportation …

[HTML][HTML] Zero Trust Cybersecurity: Procedures and Considerations in Context

BD Lund, TH Lee, Z Wang, T Wang, NR Mannuru - Encyclopedia, 2024 - mdpi.com
Definition In response to the increasing complexity and sophistication of cyber threats,
particularly those enhanced by advancements in artificial intelligence, traditional security …

Function-based access control (FBAC) from access control matrix to access control tensor

Y Desmedt, A Shaghaghi - Proceedings of the 8th ACM CCS …, 2016 - dl.acm.org
The misuse of legitimate access to data is a serious information security concern for both
organizations and individuals. From a security engineering viewpoint, this might be due to …

An adaptation of context and trust aware workflow oriented access control for remote healthcare

T Bhattasali, R Chaki, N Chaki… - International Journal of …, 2018 - World Scientific
Traditional discretionary access control (DAC) or mandatory access control (MAC) is not
quite effective for remote environment. General role-based access control (RBAC) also has …

Automated reverse engineering of role-based access control policies of web applications

HT Le, LK Shar, D Bianculli, LC Briand… - Journal of Systems and …, 2022 - Elsevier
Access control (AC) is an important security mechanism used in software systems to restrict
access to sensitive resources. Therefore, it is essential to validate the correctness of AC …

Modeling and enforcing access control policies for smart contracts

JP Töberg, J Schiffl, F Reiche, B Beckert… - 2022 IEEE …, 2022 - ieeexplore.ieee.org
Ethereum smart contracts expose their functions to an untrusted network. Therefore, access
control is of utmost importance. Nevertheless, many smart contracts have suffered exploits …

[PDF][PDF] Adaptive security schemes based on context and trust for ubiquitous computing environment: A comprehensive survey

G Jagadamba, BS Babu - Indian J. Sci. Technol, 2017 - sciresol.s3.us-east-2.amazonaws …
Objectives: To present the principle of working of some of the widely used adaptive security
schemes in the domain of ubiquitous computing. Methods/Statistical Analysis: The main …

Role based access control design using three-way formal concept analysis

CM Subramanian, AK Cherukuri, C Chelliah - International Journal of …, 2018 - Springer
Role based access control (RBAC) is one of the popular access control models. On
representing the policy behind RBAC, the literatures investigate the use of various …

[HTML][HTML] A domain-specific language for the specification of UCON policies

AMR Quintero, SM Pérez, ÁJ Varela-Vaca… - Journal of information …, 2022 - Elsevier
Security policies constrain the behavior of all users of an information system. In any non-
trivial system, these security policies go beyond simple access control rules and must cover …