Research on access control scheme of system wide information management based on attribute association

L Zhang, Z You, K Wang, Z Cui - Security and Communication …, 2022 - Wiley Online Library
System wide information management (SWIM) involves civil aviation system control,
intelligence, alarm, traffic, and other data. These data are transmitted in various forms …

Access control scheme with attribute revocation for SWIM

W Zhijun, C Zihan, W Caiyun, L Jin - The Journal of China Universities of …, 2017 - Elsevier
Access control scheme is proposed for System Wide Information Management (SWIM) to
address the problem of attribute revocation in practical applications. Based on the attribute …

Cloud-Blockchain-Fusion–Based Secure Sharing Model for Air Traffic Management

Q Wang, L Zhang, X Lu - Journal of Aerospace Information Systems, 2024 - arc.aiaa.org
Data sharing is the keystone to maintain the continuous operation of air traffic management
(ATM). As situational awareness and collaborative decision-making become significant …

[HTML][HTML] Policy-engineering optimization with visual representation and separation-of-duty constraints in attribute-based access control

W Sun, H Su, H Xie - Future Internet, 2020 - mdpi.com
Recently, attribute-based access control (ABAC) has received increasingly more attention
and has emerged as the desired access control mechanism for many organizations because …

Resource and attribute based access control model for system with huge amounts of resources

G Liu, L Fang, Q Wang, X Qi, J Cui, J Liu - Green, Pervasive, and Cloud …, 2019 - Springer
In information systems where there are a large number of different resources and the
resource attributes change frequently, the security, reliability and dynamics of access …

Assured counter-terrorism information sharing using Attribute Based Information Security (ABIS)

E Yuan, G Wenzel - 2005 IEEE Aerospace Conference, 2005 - ieeexplore.ieee.org
For counter-terrorism information sharing, just like for many other government and military
operations in the post-9/11 world, the traditional mindset of" need to know" is being …

An ontology-based approach to improve access policy administration of attribute-based access control

J Li, B Zhang - International Journal of Information and …, 2019 - inderscienceonline.com
Attribute-based access control (ABAC) needs a large number of policies to function by using
attributes of visitors, resources, environmental conditions, etc. Efficient policy administration …

AHCSABAC: Attribute value hierarchies and constraints specification in attribute-based access control

MP Singh - 2016 14th Annual Conference on Privacy, Security …, 2016 - ieeexplore.ieee.org
Attribute-based access control (ABAC) is well known for flexible policy specification and
dynamic decision-making capabilities. Unlike the other access control models, in ABAC …

Attribute-based information flow control

J Han, M Bei, L Chen, Y Xiang, J Cao… - The Computer …, 2019 - academic.oup.com
Abstract Information flow control (IFC) regulates where information is permitted to travel
within information systems. To enforce IFC, access control encryption (ACE) was proposed …

An efficient privacy‐enhanced attribute‐based access control mechanism

Y Xu, Q Zeng, G Wang, C Zhang… - Concurrency and …, 2020 - Wiley Online Library
Owing to the rapid progress of network researching, attribute‐based access control (ABAC)
has attracted more and more attention due to its appreciable expressiveness, flexibility, and …