A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
The authorization leap from rights to attributes
2012
Proceedings of the 17th ACM symposium on Access Control Models and Technologies - SACMAT '12
The cyber security research community has a responsibility to develop models, theories and systems which enable safe and chaos-free deployment of ABAC. ...
We argue that the potential benefits will lead to pervasive deployment of attribute-based access control (ABAC), and more generally attribute-based security. ...
Acknowledgments The author's work is partially supported by grants from AFOSR, NSF and the State of Texas. ...
doi:10.1145/2295136.2295150
dblp:conf/sacmat/Sandhu12
fatcat:vlkeg7wwincn5c5c7mpmjqui6a
Deploying ABAC policies using RBAC systems
2019
Journal of Computer Security
We experimentally demonstrate that time taken to evaluate an access request in RBAC and TRBAC systems is significantly less than that of the corresponding ABAC system. ...
Essentially, we propose a method for the translation of an ABAC policy (including time constraints) into a form that can be adopted by an RBAC/TRBAC system. ...
Acknowledgments Research reported in this publication was supported by the National Institutes of Health under award R01GM118574, by the National Science Foundation under awards CNS-1564034 and CNS-1624503 ...
doi:10.3233/jcs-191315
pmid:31929684
pmcid:PMC6953980
fatcat:njb7typnzzez5nb2s3sgu447fu
An Intelligent Access Control Model
[chapter]
2021
Quality Control in Intelligent Manufacturing [Working Title]
The results show better performance in the term of computation speed. ...
This proposed enhancement is implemented through a framework based on AI (Artificial Intelligent) to meet the requirements of dynamic systems. The framework is tested in the OpenStack testbed. ...
A significant amount of research has been conducted regarding the principle of Separation of Duty (SoD) in RBAC; however, SoD deployment in ABAC remains a problem [22] . ...
doi:10.5772/intechopen.95459
fatcat:kxm42pk47balzdmtxqueqapg3a
Security Middleground for Resource Protection in Measurement Infrastructure-as-a-Service
2016
IEEE Transactions on Services Computing
In this paper, we advocate the design of a security middleground between default open/closed access settings and present policy-driven access controls of measurement functions for a multi-domain federation ...
Our middleware enables 'user-to-service' and 'service-to-service' authentication, and enforces federated authorization entitlement policies for timely orchestration of MIaaS services. ...
We particularly build upon best practices of RBAC/ABAC hybrid approaches [44] , the work by authors in [45] where they verify secured cross-domain RBAC policies, and the work in [39] where chosen ...
doi:10.1109/tsc.2016.2618792
fatcat:25dcxv3kvzcova5bw3knjfpvba
Fine Grained Access Control Based on Smart Contract for Edge Computing
2022
Electronics
SCAC (Smart Contract-based Access Control) is based on ABAC (Attributes Based Access Control) and RBAC (Role Based Access Control). ...
The research objective is to combine the efficiency of service orchestration in edge computing with the security of consensus mechanism in blockchain, making full use of smart contract programmability ...
Acknowledgments: The authors acknowledge the fund of State Key Laboratory of Computer Architecture (ICT, CAS) (grant no. ...
doi:10.3390/electronics11010167
fatcat:bx4cvnqr4zgbjj7hnttkvmsgha
An Attribute-Based Access Control Model in RFID Systems Based on Blockchain Decentralized Applications for Healthcare Environments
2019
Computers
in the ABAC model in order to provide the security of RFID systems. ...
In this manuscript, we implement an ABAC model in RFID systems based on a decentralized model such as blockchain. Common criteria for the selection of the appropriate blockchain are detailed. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/computers8030057
fatcat:n2kue3yqjnff7cgr54j5a64f3e
BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs
[article]
2018
arXiv
pre-print
In this paper, BlendCAC, a blockchain enabled decentralized capability based AC is proposed for the security of IoTs. ...
The BlendCAC aims at an effective access control processes to devices, services and information in large scale IoT systems. ...
As shown by Fig. 4 , the BlendCAC also has lower latency than RBAC and ABAC in most period of time. ...
arXiv:1804.09267v1
fatcat:gybholdhv5c4hktfhuzpmbjrcy
From Conventional to State-of-the-Art IoT Access Control Models
2020
Electronics
The advent in Online Social Networks (OSN) and Internet of Things (IoT) has created a new world of collaboration and communication between people and devices. ...
The survey provides a review of the requirements for access control enforcement, discusses several security issues in access control, and elaborates underlying principles and limitations of famous access ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/electronics9101693
fatcat:mtvlbubbyvbx5ph2bnfwnmlbqa
Access Control Models in NoSQL Databases: An Overview
2019
journal of king abdulaziz university computing and information technology sciences
This paper reviews the different models of NoSQL databases and the security issues concerning these databases. In addition, we present the existing access control models in different NoSQL databases. ...
As a large number of people storing sensitive data in NoSQL databases, security issues become critical concerns. ...
In addition, the ABAC model elastic enough to support the implementation of content-based, context-based and purpose-based policies [28] . ...
doi:10.4197/comp.8-1.1
fatcat:scrsnvu4frhajhp2elqq3t2ucu
Protocol-Based and Hybrid Access Control for the IoT: Approaches and Research Opportunities
2021
Sensors
Access control determines the use of resources only to the specified and authorized users based on appropriate policy enforcement. ...
In this paper, we discuss the potential for employing protocol-based and hybrid access control for IoT systems and examine how that can overcome the limitations of traditional access control mechanisms ...
Acknowledgments: The authors acknowledge the support of the Commonwealth of Australia and Cybersecurity Research Centre Limited.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/s21206832
pmid:34696053
fatcat:blclfxxkxbf3tlkppyjdvef5fm
A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues
2020
Sensors
and environmental contexts) which are gaining a lot of momentum in the area of industrial sensor and cloud networks. ...
We conclude the paper with an in-depth analysis of the research challenges that have not been adequately addressed in the literature and highlight directions for future work that has not been well aligned ...
The building blocks of the ABAC, RBAC, DAC and MAC systems are already discussed in Section 2. ...
doi:10.3390/s20092464
pmid:32349242
fatcat:77owmk23lbej5aqyllwkcmoxt4
EAR-ABAC: An Extended AR-ABAC Access Control Model for SDN-Integrated Cloud Computing
2015
International Journal of Computer Applications
Where the author's AR-ABAC access control model [15] is extended to suit the SDN-integrated cloud environment distinguished nature. ...
The extended model can make the election process about the number of attributes considered for making access decisions. ...
Acknowledgment The authors would like to thank the National Natural Foundation of China for partly supporting this work (Grant No. 61472032 and 61170264). ...
doi:10.5120/ijca2015907649
fatcat:ayv4pey3rzftxoepxfsyxfgglm
An Access Control Model for Web Services with Dynamic Separation of Duty Rules
2012
International Journal of Computer Applications
One of the underlined issues in this model is Separation of Duty (SoD) policy, which is widely considered to be a fundamental security principle for prevention of fraud and errors in information security ...
In these processes, shared resources are often used and there are complex relationships between activities and users, so the definition and administration of different security levels (tasks, users, resources ...
One additional benefit to Web service implementations of ABAC lies in the nature of the loose definition of subjects. . )) ( ), ( ), ( ( ) Because ABAC provides the flexibility to associate policy rules ...
doi:10.5120/5694-7469
fatcat:zqgwxr2jffgvpkryq23s6k5uwm
A Decentralized Blockchain-based Architecture for a Secure Cloud-Enabled IoT
2020
Journal of Mobile Multimedia
The simulation results show that the proposal is an efficient way of implementing ubiquitous and cognitive tools for smart healthcare systems. ...
The integration of cloud computing and Internet of Things (IoT) offers a promising, rich platform for data collection and analysis in smart healthcare. ...
Table 1 1 Advantages and disadvantages of existing access control systems Models Pros Cons DAC -It enables faster development and -It is limited in its scalability. deployment. ...
doi:10.13052/jmm1550-4646.1636
fatcat:ijenhwanlbfizguf627huskfpa
Towards a Secure and Borderless Collaboration between Organizations: An Automated Enforcement Mechanism
2018
Security and Communication Networks
Several access control models are defined in the literature and this multitude of models creates heterogeneity of access control policies between the collaborating organizations. ...
During the last decade, organizations have been more and more aware of the benefits of engaging in collaborative activities. ...
Conflicts of Interest The authors declare that there are no conflicts of interest regarding the publication of this paper. ...
doi:10.1155/2018/1572812
fatcat:e5soqdlf4bdbbfcrwkwgr26i2i
« Previous
Showing results 1 — 15 out of 429 results