TrustBAC: integrating trust relationships into the RBAC model for access control in open systems
S Chakraborty, I Ray - Proceedings of the eleventh ACM symposium on …, 2006 - dl.acm.org
Conventional access control are suitable for regulating access to resources by known users.
However, these models have often found to be inadequate for open and decentralized multi …
However, these models have often found to be inadequate for open and decentralized multi …
A trust-based context-aware access control model for web-services
R Bhatti, E Bertino, A Ghafoor - Distributed and Parallel Databases, 2005 - Springer
A key challenge in Web services security is the design of effective access control schemes
that can adequately meet the unique security challenges posed by the Web services …
that can adequately meet the unique security challenges posed by the Web services …
Securecloud: Towards a comprehensive security framework for cloud computing environments
Cloud computing has recently gained tremendous momentum but still is in its infancy. It has
the potential for significant cost reduction and the increased operating efficiencies in …
the potential for significant cost reduction and the increased operating efficiencies in …
XML-based specification for web services document security
The Internet and related technologies have seen tremendous growth in distributed
applications such as medicine, education, e-commerce, and digital libraries. As demand …
applications such as medicine, education, e-commerce, and digital libraries. As demand …
Method and system for authentication by defining a demanded level of security
LY Gomez, I Thomas - US Patent 8,490,154, 2013 - Google Patents
There is provided a computer-implemented method for authentication, the method
comprising: defining a demanded level of security in an authorization service of a server; …
comprising: defining a demanded level of security in an authorization service of a server; …
[PDF][PDF] Review of access control models for cloud computing
N Meghanathan - Computer Science & Information Science, 2013 - researchgate.net
The relationship between users and resources is dynamic in the cloud, and service
providers and users are typically not in the same security domain. Identity-based security …
providers and users are typically not in the same security domain. Identity-based security …
SBA-XACML: Set-based approach providing efficient policy decision process for accessing Web services
A Mourad, H Jebbaoui - Expert systems with applications, 2015 - Elsevier
Policy-based computing is taking an increasing role in providing real-time decisions and
governing the systematic interaction among distributed Web services. XACML (eXtensible …
governing the systematic interaction among distributed Web services. XACML (eXtensible …
Access control policy analysis using free variable tableaux
H Kamoda, M Yamaoka, S Matsuda… - Information and Media …, 2006 - jstage.jst.go.jp
The specification of access control policies for large, multi-organization applications is
difficult and error-prone. Sophisticated policies are needed for fine-grained control of access …
difficult and error-prone. Sophisticated policies are needed for fine-grained control of access …
A role-based approach to access control for XML databases
J Wang, SL Osborn - Proceedings of the ninth ACM symposium on …, 2004 - dl.acm.org
In order to provide a general access control methodology for parts of XML documents, we
propose combining role-based access control as found in the Role Graph Model, with a …
propose combining role-based access control as found in the Role Graph Model, with a …
The e language: A fresh separation of concerns
Y Hollander, M Morley, A Noy - Proceedings Technology of …, 2001 - ieeexplore.ieee.org
The e programming language enjoys widespread use in the microchip industry with
applications to specification, modeling, testing and verification of hardware systems and …
applications to specification, modeling, testing and verification of hardware systems and …