[HTML][HTML] Access control for IoT: A survey of existing research, dynamic policies and future directions

K Ragothaman, Y Wang, B Rimal, M Lawrence - Sensors, 2023 - mdpi.com
Internet of Things (IoT) provides a wide range of services in domestic and industrial
environments. Access control plays a crucial role in granting access rights to users and …

Blockchain based access control systems: State of the art and challenges

S Rouhani, R Deters - IEEE/WIC/ACM International Conference on Web …, 2019 - dl.acm.org
Access control is a mechanism in computer security that regulates access to the system
resources. The current access control systems face many problems, such as the presence of …

Multiview: Finding Blind Spots in {Access-Deny} Issues Diagnosis

B Shen, T Shan, Y Zhou - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
Access-deny issues are hard to fix because it implies both availability and security
requirements. On one hand, system administrators (sysadmins) need to make a change …

Improving Logging to Reduce Permission {Over-Granting} Mistakes

B Shen, T Shan, Y Zhou - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
Access control configurations are gatekeepers to block unwelcome access to sensitive data.
Unfortunately, system administrators (sysadmins) sometimes over-grant permissions when …

[图书][B] Automatic Methods to Enhance Server Systems in Access Control Diagnosis

B Shen - 2022 - search.proquest.com
Access control configurations are gatekeepers to block unwelcome access to sensitive data.
Unfortunately, system administrators (sysadmins) sometimes over-grant permissions when …

Sustainable adaptive security

L Pasquale, K Ramkumar, W Cai, J McCarthy… - arXiv preprint arXiv …, 2023 - arxiv.org
With software systems permeating our lives, we are entitled to expect that such systems are
secure by design, and that such security endures throughout the use of these systems and …

Agenp: An asgrammar-based generative policy framework

S Calo, I Manotas, G de Mel, D Cunnington… - Policy-based autonomic …, 2019 - Springer
Generative policies have been proposed as a mechanism to learn the constraints and
preferences of a system—especially complex systems such as the ones found in coalitions …

[PDF][PDF] Data trust framework using blockchain and smart contracts

S Rouhani - 2021 - harvest.usask.ca
Lack of trust is the main barrier preventing more widespread data sharing. The lack of
transparent and reliable infrastructure for data sharing prevents many data owners from …

Value of information: Quantification and application to coalition machine learning

G Pearson, D Verma, G de Mel - Policy-based autonomic data …, 2019 - Springer
The creation of good machine learning models relies on the availability of good training
data. In coalition settings, this training data may be obtained from many different coalition …

On the impact of generative policies on security metrics

D Verma, E Bertino, G de Mel… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Policy based Security Management in an accepted practice in the industry, and required to
simplify the administrative overhead associated with security management in complex …