Toward a usage-based security framework for collaborative computing systems

X Zhang, M Nakae, MJ Covington… - ACM Transactions on …, 2008 - dl.acm.org
Collaborative systems such as Grids provide efficient and scalable access to distributed
computing capabilities and enable seamless resource sharing between users and platforms …

Firefly mosaic: A vision-enabled wireless sensor networking system

A Rowe, D Goel, R Rajkumar - 28th IEEE International Real …, 2007 - ieeexplore.ieee.org
With the advent of CMOS cameras, it is now possible to make compact, cheap and low-
power image sensors capable of on-board image processing. These embedded vision …

A usage-based authorization framework for collaborative computing systems

X Zhang, M Nakae, MJ Covington… - Proceedings of the …, 2006 - dl.acm.org
Collaborative systems such as Grids provide efficient and scalable access to distributed
computing capabilities and enable seamless resource sharing between users and platforms …

PolyOrBAC: A security framework for Critical Infrastructures

A Abou El Kalam, Y Deswarte, A Baïna… - International Journal of …, 2009 - Elsevier
Due to physical and logical vulnerabilities, a critical infrastructure (CI) can encounter failures
of various degrees of severity, and since there are many interdependencies between CIs …

Role-based integrated access control and data provenance for SOA based net-centric systems

W She, W Zhu, IL Yen, F Bastani… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In multi-domain service-based systems, services from different domains are composed
together to accomplish critical tasks. In these systems, data flow from one domain to another …

Cloudvo: Building a secure virtual organization for multiple clouds collaboration

J Li, B Li, Z Du, L Meng - 2010 11th ACIS International …, 2010 - ieeexplore.ieee.org
Cloud computing has become a popular computing paradigm in which virtualized and
scalable resources are consolidated to provide services over Internet. However, the …

Information flow control with decentralized service compositions

U Yildiz, C Godart - … Conference on Web Services (ICWS 2007), 2007 - ieeexplore.ieee.org
Decentralized execution settings are primordial for most processes where process
participants are required to establish P2P interactions. This is particularly true for processes …

Access Control in Dynamic IoT Scenarios

IL Yen, A Tiwari, F Bastani - 2023 IEEE 15th International …, 2023 - ieeexplore.ieee.org
We consider an IoT system where IoT devices are ubiquitous, distributed all over the
environment. When some situation arises dynamically, the IoT services may collaborate to …

A secure collaboration service for dynamic virtual organizations

J Li, J Huai, C Hu, Y Zhu - Information Sciences, 2010 - Elsevier
Nowadays, various promising paradigms of distributed computing over the Internet, such as
Grids, P2P and Clouds, have emerged for resource sharing and collaboration. To enable …

Resource and role hierarchy based access control for resourceful systems

N Solanki, Y Huang, IL Yen, F Bastani… - 2018 IEEE 42nd …, 2018 - ieeexplore.ieee.org
Role based access control (RBAC) has been used extensively in practice since it naturally
capturing the structure of the users in an organization. It is especially useful in multi-tenant …