Filters








126 Hits in 2.9 sec

Representing Attribute Based Access Control Policies in OWL

Nitin Kumar Sharma, Anupam Joshi
<span title="">2016</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wckytungwvfnhotxmw56y6k3q4" style="color: black;">2016 IEEE Tenth International Conference on Semantic Computing (ICSC)</a> </i> &nbsp;
Attribute Based Access Control (ABAC) models are designed with the intention to overcome the shortcomings of classical access control models (DAC, MAC and RBAC) and unifying their advantages.  ...  OWL can be used to formally define and process security policies that can be captured using ABAC models.  ...  Support was also provided in part to Joshi by NSF awards CNS1228673 and IIS0910838. Authors appreciate the discussions with Dr. G. Athithan, Ms. Anu Khosla, Prof. Tim Finin, and Dr.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icsc.2016.16">doi:10.1109/icsc.2016.16</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/semco/SharmaJ16.html">dblp:conf/semco/SharmaJ16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mdiladg5ibdtlezghrjdg6fci4">fatcat:mdiladg5ibdtlezghrjdg6fci4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200321045704/https://ebiquity.umbc.edu/_file_directory_/papers/798.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/32/29/3229cf0d18e5815a2f9b6d3e3ab0d15bd63b9d22.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icsc.2016.16"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Metamodel for Hybrid Access Control Policies

Jamal Abd-Ali, Karim El Guemhioui, Luigi Logrippo
<span title="">2015</span> <i title="International Academy Publishing (IAP)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jr7366lnajgfrhmmgwgrpt3o7u" style="color: black;">Journal of Software</a> </i> &nbsp;
Actually, it is characterized by the sensitivity and criticality of its contents where clarity and formalism are yet essential desired goals.  ...  In a metamodelling approach where textual languages and visual models are two equivalent forms of specifications, we propose an AC metamodel, setting the stage for its derived textual language.  ...  Acknowledgment This research was funded in part by the Natural Sciences and Engineering Research Council of Canada.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17706/jsw.10.7.784-797">doi:10.17706/jsw.10.7.784-797</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/k4mt5vxmvjdafohnkwif7357sa">fatcat:k4mt5vxmvjdafohnkwif7357sa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721162337/http://www.jsoftware.us/vol10/64-jsw140915-1362.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d8/29/d829ce17acac390c06093e665ab63dcd9059a263.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17706/jsw.10.7.784-797"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A Metamodel for Hybrid Access Control Policies

Jamal Abd-Ali
<span title="">2015</span> <i title="International Academy Publishing (IAP)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jr7366lnajgfrhmmgwgrpt3o7u" style="color: black;">Journal of Software</a> </i> &nbsp;
Actually, it is characterized by the sensitivity and criticality of its contents where clarity and formalism are yet essential desired goals.  ...  In a metamodelling approach where textual languages and visual models are two equivalent forms of specifications, we propose an AC metamodel, setting the stage for its derived textual language.  ...  Acknowledgment This research was funded in part by the Natural Sciences and Engineering Research Council of Canada.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17706//jsw.10.7.784-797">doi:10.17706//jsw.10.7.784-797</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/h42jokbqvjcepaadnk5aoc3nlq">fatcat:h42jokbqvjcepaadnk5aoc3nlq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721162337/http://www.jsoftware.us/vol10/64-jsw140915-1362.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d8/29/d829ce17acac390c06093e665ab63dcd9059a263.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17706//jsw.10.7.784-797"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

SWOT analysis of access control models

Ennahbaoui Mohammed, El Hajji Said
<span title="2014-05-31">2014</span> <i title="Science and Engineering Research Support Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4h7flaxsjnh6he3qbiwvxbekxe" style="color: black;">International Journal of Security and Its Applications</a> </i> &nbsp;
This paper exposes the results found through a SWOT analysis on the well-known models, and presents the advantages and drawbacks of each model.  ...  In order to ensure the best Access Control policy, it is mandatory to proceed to a modeling phase that respects a set of indications and criteria of a predefined model.  ...  The Bell-LaPadula Model (BLP) The Bell-LaPadula model (BLP), developed in 1975 [4, 9] seeks to preserve the confidentiality of the data, that is to say that these latter are only accessible by authorized  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijsia.2014.8.3.39">doi:10.14257/ijsia.2014.8.3.39</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6pvgs7clcnh5jalqd2ov6jqx7u">fatcat:6pvgs7clcnh5jalqd2ov6jqx7u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180604061637/http://www.sersc.org/journals/IJSIA/vol8_no3_2014/39.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/94/16/941681c9210b334b9b4abe011f260179ddb82401.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijsia.2014.8.3.39"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Application-Sensitive Access Control Evaluation Using Parameterized Expressiveness

Timothy L. Hinrichs, Diego Martinoia, William C. Garrison III, Adam J. Lee, Alessandro Panebianco, Lenore Zuck
<span title="">2013</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kea5jpvemrdmvbwvgh5jn6gog4" style="color: black;">2013 IEEE 26th Computer Security Foundations Symposium</a> </i> &nbsp;
The analyst's main task is to evaluate an access control scheme in terms of how well it implements a given access control workload (a formalism that we introduce to represent an application's access control  ...  Access control schemes come in all shapes and sizes, which makes choosing the right one for a particular application a challenge.  ...  For each workload, we analyze the suitability of four variations of the access matrix model, three variations of the RBAC model, and three variations of Bell-LaPadula.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/csf.2013.17">doi:10.1109/csf.2013.17</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/csfw/HinrichsMGLPZ13.html">dblp:conf/csfw/HinrichsMGLPZ13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lncriqkyrvcjlacrto6nb6trty">fatcat:lncriqkyrvcjlacrto6nb6trty</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809004200/https://www.cs.uic.edu/~hinrichs/papers/hinrichs2013application.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a4/25/a4251c23556e5fdb6fa353291986cbc2385a1a2c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/csf.2013.17"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

From Conventional to State-of-the-Art IoT Access Control Models

Ahmad Kamran Malik, Naina Emmanuel, Sidra Zafar, Hasan Ali Khattak, Basit Raza, Sarmadullah Khan, Ali H. Al-Bayatti, Madini O. Alassafi, Ahmed S. Alfakeeh, Mohammad A. Alqarni
<span title="2020-10-15">2020</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ikdpfme5h5egvnwtvvtjrnntyy" style="color: black;">Electronics</a> </i> &nbsp;
We evaluate the feasibility of current access control models for OSN and IoT and provide the future development direction of access control for the same.  ...  The advent in Online Social Networks (OSN) and Internet of Things (IoT) has created a new world of collaboration and communication between people and devices.  ...  Acknowledgments: The authors acknowledge with thanks Deanship of Scientific Research (DSR), King Abdulaziz University, Jeddah, Saudi Arabia for technical and financial support.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/electronics9101693">doi:10.3390/electronics9101693</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mtvlbubbyvbx5ph2bnfwnmlbqa">fatcat:mtvlbubbyvbx5ph2bnfwnmlbqa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201021160148/https://res.mdpi.com/d_attachment/electronics/electronics-09-01693/article_deploy/electronics-09-01693-v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f7/51/f751f53d384ffecc71b1b49d61d82d8210fcc111.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/electronics9101693"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Modeling Enterprise Authorization: A Unified Metamodel and Initial Validation

Matus Korman, Robert Lagerström, Mathias Ekstedt
<span title="2016-07-29">2016</span> <i title="Riga Technical University"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7x2fnprjunaivnur5fp3ewwnzy" style="color: black;">Complex Systems Informatics and Modeling Quarterly</a> </i> &nbsp;
of individual models of access control nowadays used, and in terms of providing a unified ontology capable of flexibly expressing access policies for all or the most of the models.  ...  This study summarizes a number of existing models of access control, proposes a unified metamodel mapped to ArchiMate, and illustrates its use on a selection of example scenarios and two business cases  ...  Acknowledgments This study has been financed by SweGrids, the Swedish Centre for Smart Grids and Energy Storage (www.swegrids.se).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7250/csimq.2016-7.01">doi:10.7250/csimq.2016-7.01</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bv5kadtzerbojik5zlg2jatwj4">fatcat:bv5kadtzerbojik5zlg2jatwj4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721235300/https://csimq-journals.rtu.lv/article/download/csimq.2016-7.01/822" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/89/63/8963fd5b979861bed9ac74b7983a40b59a07824f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7250/csimq.2016-7.01"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Supporting parameterised roles with object-based access control

M. Evered
<span title="">2003</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/zlnwsi4sefbkvlcgv2zcupjqum" style="color: black;">36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the</a> </i> &nbsp;
In particular, the concept of parameterised roles, central to a fine-grained specification of access rules and compliance with privacy laws, should be supported in a natural way.  ...  The per-method access control lists of standard internet technologies allow only simple forms of access control to be expressed and enforced.  ...  The 'teller' example of section 2.2 and the Bell-LaPadula example of the previous section can be seen as simple forms of RBAC.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/hicss.2003.1174463">doi:10.1109/hicss.2003.1174463</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/hicss/Evered03.html">dblp:conf/hicss/Evered03</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/743i2o4cyfd45g7sa652dgfvxu">fatcat:743i2o4cyfd45g7sa652dgfvxu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20040915000307/http://csdl.computer.org:80/comp/proceedings/hicss/2003/1874/07/187470204c.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ce/08/ce084bb74dd2791ea5659b85a8e992c03f7a0fe8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/hicss.2003.1174463"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

An Algebraic Model to Analyze Role-Based Access Control Policies

Khair Eddin Sabri
<span title="2018-09-12">2018</span> <i title="Canadian Center of Science and Education"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dnqawnwqovdj3mqtnnzu4eiaf4" style="color: black;">Modern Applied Science</a> </i> &nbsp;
Role-Based Access Control (RBAC) is a well known access control model used to preserve the confidentiality of information by specifying the ability of users to access information based on their roles.  ...  The proposed model enables us to specify policies and verify the satisfaction of predefined authorization constraints.  ...  As a future work we aim at extending the model to involve the set of prohibited objects from a set of user subjects and to detect potential conflicts as a result of combining policies.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5539/mas.v12n10p50">doi:10.5539/mas.v12n10p50</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rddo4cnk7vdrvdokk3l54emoz4">fatcat:rddo4cnk7vdrvdokk3l54emoz4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200306040623/http://www.ccsenet.org/journal/index.php/mas/article/download/0/0/36856/36917" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c7/04/c7046a82a9e1ae77483c757858c56d316ae17700.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5539/mas.v12n10p50"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Survey on Security Techniques of Wireless Sensor Networking

<span title="2017-08-30">2017</span> <i title="International Journal for Research in Applied Science and Engineering Technology (IJRASET)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hsp44774azcezeyiq4kuzpfh5a" style="color: black;">International Journal for Research in Applied Science and Engineering Technology</a> </i> &nbsp;
This paper consists of WSN security issues, security solutions and other related techniques are discussed in detail. In this work includes the comparison of various techniques.  ...  An idle security model involves the end to end authentication, data encryption, etc, which must be incorporated to ensure the prospective security of the sensor network.  ...  Sandhu's BLP model is primarily designed by implementing the encapsulation layer over the Bell-LaPadula model.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22214/ijraset.2017.8259">doi:10.22214/ijraset.2017.8259</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lysrojyigzbi7d6cf5sysu7z6y">fatcat:lysrojyigzbi7d6cf5sysu7z6y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602153259/http://ijraset.com/fileserve.php?FID=9666" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/29/d9/29d98cc430f101c61e42a66972bbe4baaaebd8e8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22214/ijraset.2017.8259"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Access Control Models

Maria Penelova
<span title="2021-12-01">2021</span> <i title="Walter de Gruyter GmbH"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yqncwzlovvhvhktpm65k4wwuoe" style="color: black;">Cybernetics and Information Technologies</a> </i> &nbsp;
Access control is a part of the security of information technologies. Access control regulates the access requests to system resources. The access control logic is formalized in models.  ...  With the developing of information technologies, more complex access control models have been created. This paper is concerned with overview and analysis for a number of access control models.  ...  It is important to combine the model of Bell-LaPadula and the model of Biba, to ensure both confidentiality and integrity of a software system.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2478/cait-2021-0044">doi:10.2478/cait-2021-0044</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jaq65u6lcbdwlae4xlsazje6um">fatcat:jaq65u6lcbdwlae4xlsazje6um</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220423185501/https://www.sciendo.com/pdf/10.2478/cait-2021-0044" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/eb/dd/ebdd88c73158816761934ebdc5fb225b8bb1f7f2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2478/cait-2021-0044"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Enhancing Role-Based Access Control Model through Fuzzy Relations

Hassan Takabi, Morteza Amini, Rasool Jalili
<span title="">2007</span> <i title="IEEE"> Third International Symposium on Information Assurance and Security </i> &nbsp;
An existing RBAC model is extended to allow imprecise access control policies, using the concept of trustworthiness which is fuzzy in nature. We call the extended model as Fuzzy RBAC.  ...  Additionally, with the increasing number of users, RBAC may have problems in prohibiting cheat and changing roles of users.  ...  He offers a fuzzy version of the Bell-LaPadula model. Other researchers, Richard A. Alo, et al., have provided a fuzzy access control model in distributed systems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/isias.2007.4299763">doi:10.1109/isias.2007.4299763</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nae2htg6tbembfxtxjcto7szyy">fatcat:nae2htg6tbembfxtxjcto7szyy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170519225746/http://sharif.edu:80/~amini/publications/conferences/2007/EnhancingRoleBasedAccessControlModelThroughFuzzyRelations-IAS2007.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7d/36/7d368e48f45420e6a2ae182a8e14de8a544fcb50.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/isias.2007.4299763"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Enhancing Role-Based Access Control Model through Fuzzy Relations

Hassan Takabi, Morteza Amini, Rasool Jalili
<span title="">2007</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/r3cb3izy5ra5fekillul4z67sa" style="color: black;">Third International Symposium on Information Assurance and Security</a> </i> &nbsp;
An existing RBAC model is extended to allow imprecise access control policies, using the concept of trustworthiness which is fuzzy in nature. We call the extended model as Fuzzy RBAC.  ...  Additionally, with the increasing number of users, RBAC may have problems in prohibiting cheat and changing roles of users.  ...  He offers a fuzzy version of the Bell-LaPadula model. Other researchers, Richard A. Alo, et al., have provided a fuzzy access control model in distributed systems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ias.2007.69">doi:10.1109/ias.2007.69</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/IEEEias/TakabiAJ07a.html">dblp:conf/IEEEias/TakabiAJ07a</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/v7gzmdp6szgtrkxlafwy5oqn3u">fatcat:v7gzmdp6szgtrkxlafwy5oqn3u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170519225746/http://sharif.edu:80/~amini/publications/conferences/2007/EnhancingRoleBasedAccessControlModelThroughFuzzyRelations-IAS2007.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7d/36/7d368e48f45420e6a2ae182a8e14de8a544fcb50.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ias.2007.69"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Personalizing access control by generalizing access control

Steve Barker
<span title="">2010</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/zvequ7qfrbgczndjrctvenju7y" style="color: black;">Proceeding of the 15th ACM symposium on Access control models and technologies - SACMAT &#39;10</a> </i> &nbsp;
We introduce a conceptual framework, a syntax, a semantics, and an axiomatization of a generalized form of access control meta-model, which may be specialized in various ways to enable data subjects to  ...  Existing approaches for this are not always sufficient in terms of offering the degrees of control and scope for individualization of access policies that are needed for personal data protection (and usage  ...  In terms of M P , a version of the Bell-LaPadula model [11] , with purpose P and subject-specified access controls, may be viewed as a restricted form of the purpose-based Hierarchical RBAC model, in  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1809842.1809866">doi:10.1145/1809842.1809866</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sacmat/Barker10.html">dblp:conf/sacmat/Barker10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nt45bspjbjf3nclnnrrmka6fkm">fatcat:nt45bspjbjf3nclnnrrmka6fkm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809044205/http://courses.cs.vt.edu/cs5204/fall12-kafura/Papers/Security/Personalizing-Generalizing-Access-Control.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/65/47/6547d25b055864300138b335f75ac9aebd5643a1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1809842.1809866"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

A framework of composable access control features: Preserving separation of access control concerns from models to code

Jaime A. Pavlich-Mariscal, Steven A. Demurjian, Laurent D. Michel
<span title="">2010</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/e25s2ofdbnfb3j2rstrnkqsqfi" style="color: black;">Computers &amp; security</a> </i> &nbsp;
access control models: role-based access control (RBAC), mandatory access control (MAC), and discretionary access control (DAC).  ...  UML Separation of concerns Software engineering Model-driven development a b s t r a c t Modeling of security policies, along with their realization in code, must be an integral part of the software development  ...  rules that restrict pairwise composition between the operands (Bell and LaPadula, 1975; Bell and LaPadula, 1976; Sandhu, 1993) .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.cose.2009.11.005">doi:10.1016/j.cose.2009.11.005</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qqg736n42zg4jkrwnv5wrw756i">fatcat:qqg736n42zg4jkrwnv5wrw756i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160519052304/http://www.engr.uconn.edu:80/%7Esteve/Cse5810/Pavlich_Journal1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1c/42/1c4220fd59aa62aad64d560d48c9ae4b3ff4adef.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.cose.2009.11.005"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 126 results